Results 1 to 10 of about 68,797 (213)

SKINNY-AEAD and SKINNY-Hash

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family of tweakable block ciphers, which was presented at CRYPTO 2016, as the underlying
Christof Beierle   +8 more
doaj   +5 more sources

Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis [PDF]

open access: yesEntropy, 2023
Lightweight block ciphers are normally used in low-power resource-constrained environments, while providing reliable and sufficient security. Therefore, it is important to study the security and reliability of lightweight block ciphers.
Xing Fang   +4 more
doaj   +3 more sources

Fat Cantor sets and their skinny companions [PDF]

open access: yesHeliyon, 2023
The terms fat and skinny in the title are vernacular references to Cantor sets of positive and zero measure respectively. The paper demonstrates that a fat Cantor subset of [0,L], L>0, possesses a skinny companion that forms a Cantor subset of [0,G ...
David R. Dellwo
doaj   +3 more sources

Improving dependability with low power fault detection model for skinny-hash. [PDF]

open access: yesPLoS ONE
The increasing popularity and prevalence of Internet of Things (IoT) applications have led to the widespread use of IoT devices. These devices gather information from their environment and send it across a network. IoT devices are unreliable due to their
Sonal Arvind Barge   +1 more
doaj   +3 more sources

Improved Rectangle Attacks on SKINNY and CRAFT

open access: yesIACR Transactions on Symmetric Cryptology, 2021
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher E as a composition of two sub-ciphers, i.e., E = E1 ∘ E0, to construct a distinguisher for E with probability p2q2 by concatenating two short ...
Hosein Hadipour   +2 more
doaj   +2 more sources

Pincering SKINNY by Exploiting Slow Diffusion

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Lightweight cryptography is an emerging field where designers are testing the limits of symmetric cryptography. We investigate the resistance against sidechannel attacks of a new class of lighter blockciphers, which use a classic substitution ...
Nicolas Costes, Martijn Stam
doaj   +2 more sources

Healthy or skinny? The negotiation between fear appeal and danmu in anorexia awareness videos. [PDF]

open access: yesJ Eat Disord
This study seeks to investigate the impact of anorexia awareness videos on the perception of anorexic figures and pro-anorexia attitude among young females, considering the employed fear appeals and the presence of pro-anorexia content in danmu, an ...
Shi M, Chen S, Wang K.
europepmc   +2 more sources

Revisiting the Multiple-of Property for SKINNY: The Exact Computation of the Number of Right Pairs

open access: yesIEEE Access
At EUROCRYPT 2017, Grassi et al. proposed the multiple-of-8 property for 5-round $\mathtt {AES}$ , where the number $n$ of right pairs is a multiple of 8. At ToSC 2019, Boura et al.
Hanbeom Shin   +6 more
doaj   +2 more sources

Catching the Fastest Boomerangs

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In this paper we describe a new tool to search for boomerang distinguishers. One limitation of the MILP model of Liu et al. is that it handles only one round for the middle part while Song et al. have shown that dependencies could affect much more rounds,
Stéphanie Delaune   +2 more
doaj   +4 more sources

SKINNY-Based RFID Lightweight Authentication Protocol

open access: yesSensors, 2020
With the rapid development of the Internet of Things and the popularization of 5G communication technology, the security of resource-constrained IoT devices such as Radio Frequency Identification (RFID)-based applications have received extensive ...
He Xu, Feng Zhu, Peng Li
exaly   +3 more sources

Home - About - Disclaimer - Privacy