Results 1 to 10 of about 66,253 (280)
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family of tweakable block ciphers, which was presented at CRYPTO 2016, as the underlying
Christof Beierle +8 more
doaj +3 more sources
Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis [PDF]
Lightweight block ciphers are normally used in low-power resource-constrained environments, while providing reliable and sufficient security. Therefore, it is important to study the security and reliability of lightweight block ciphers.
Xing Fang +4 more
doaj +2 more sources
Fat Cantor sets and their skinny companions [PDF]
The terms fat and skinny in the title are vernacular references to Cantor sets of positive and zero measure respectively. The paper demonstrates that a fat Cantor subset of [0,L], L>0, possesses a skinny companion that forms a Cantor subset of [0,G ...
David R. Dellwo
doaj +2 more sources
SKINNY-Based RFID Lightweight Authentication Protocol
With the rapid development of the Internet of Things and the popularization of 5G communication technology, the security of resource-constrained IoT devices such as Radio Frequency Identification (RFID)-based applications have received extensive ...
He Xu, Feng Zhu, Peng Li
exaly +3 more sources
Improving dependability with low power fault detection model for skinny-hash. [PDF]
The increasing popularity and prevalence of Internet of Things (IoT) applications have led to the widespread use of IoT devices. These devices gather information from their environment and send it across a network. IoT devices are unreliable due to their
Sonal Arvind Barge +1 more
doaj +2 more sources
The CCN family of matricellular proteins directly or indirectly affects development and differentiation. A recent report written by Tan and colleagues (Am J Physiol Cell Physiol 295: C740-C751 2008) shows that CCN2 inhibits adipocyte differentiation. This commentary summarizes these observations.
Andrew Leask +7 more
core +3 more sources
9-fold symmetry is not essential for centriole elongation and formation of new centriole-like structures [PDF]
As daughter centrioles assemble during G2, they recruit conserved Ana3/RTTN followed by its partner Rcd4/PPP1R35. Together, this contributes to the subsequent recruitment of Ana1/CEP295, required for the centriole’s conversion to a centrosome.
Pallavi Panda +2 more
doaj +2 more sources
Improved Rectangle Attacks on SKINNY and CRAFT
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher E as a composition of two sub-ciphers, i.e., E = E1 ∘ E0, to construct a distinguisher for E with probability p2q2 by concatenating two short ...
Hosein Hadipour +2 more
doaj +1 more source
New Results on Machine Learning-Based Distinguishers
Machine Learning (ML) is almost ubiquitously used in multiple disciplines nowadays. Recently, we have seen its usage in the realm of differential distinguishers for symmetric key ciphers. It has been shown that ML-based differential distinguishers can be
Anubhab Baksi +5 more
doaj +1 more source

