We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 22 results
  1. Cube Attacks on Round-Reduced Grain-128AEAD

    Lightweight cryptography aims to design secure and efficient cryptographic algorithms for resource-constrained devices. Traditional cryptographic...
    Wil Liam Teng, Iftekhar Salam, ... Jia Yew Teh in Emerging Technologies in Computing
    Conference paper 2024
  2. Superpoly Recovery of Grain-128AEAD Using Division Property

    The cube attack is a powerful cryptanalytic technique against stream ciphers. Cube attacks exploit the algebraic properties of symmetric ciphers by...
    Conference paper 2023
  3. Key Filtering in Cube Attacks from the Implementation Aspect

    In cube attacks, key filtering is a basic step of identifying the correct key candidates by referring to the truth tables of superpolies. When terms...
    Hao Fan, Yonglin Hao, ... Lin Jiao in Cryptology and Network Security
    Conference paper 2023
  4. Massive Superpoly Recovery with a Meet-in-the-Middle Framework

    The cube attack extracts the information of secret key bits by recovering the coefficient called superpoly in the output bit with respect to a subset...
    Jiahui He, Kai Hu, ... Meiqin Wang in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  5. Massive Superpoly Recovery with Nested Monomial Predictions

    Determining the exact algebraic structure or some partial information of the superpoly for a given cube is a necessary step in the cube attack – a...
    Kai Hu, Siwei Sun, ... Qingju Wang in Advances in Cryptology – ASIACRYPT 2021
    Conference paper 2021
  6. Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies

    Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special polynomial, the superpoly, and subsequently the secret...
    Jiahui He, Kai Hu, ... Meiqin Wang in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  7. Efficient Hardware Implementations of Grain-128AEAD

    We implement the Grain-128AEAD stream cipher in hardware, using a 65 nm library. By exploring different optimization techniques, both at RTL level...
    Jonathan Sönnerup, Martin Hell, ... Ripudaman Khattar in Progress in Cryptology – INDOCRYPT 2019
    Conference paper 2019
  8. Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction

    Properties of the Grain-128AEAD key re-introduction, as part of the cipher initialization, are analyzed and discussed. We consider and analyze...
    Martin Hell, Thomas Johansson, ... Hirotaka Yoshida in Cryptology and Network Security
    Conference paper 2021
  9. Modeling for Three-Subset Division Property without Unknown Subset

    A division property is a generic tool to search for integral distinguishers, and automatic tools such as MILP or SAT/SMT allow us to evaluate the...

    Yonglin Hao, Gregor Leander, ... Qingju Wang in Journal of Cryptology
    Article 20 May 2021
  10. Algebraic Attacks on Grain-Like Keystream Generators

    This paper analyses the resistance of certain keystream generators against algebraic attacks, namely generators consisting of a nonlinear feedback...
    Matthew Beighton, Harry Bartlett, ... Kenneth Koon-Ho Wong in Information Security and Cryptology – ICISC 2021
    Conference paper 2022
  11. Resource-Aware Cryptography: An Analysis of Lightweight Cryptographic Primitives

    With the increased use of highly constrained interconnected devices in various areas like healthcare, sensor networks, the internet of things (IoT),...

    Mohammed Rushad, Akshat Nambiar, B. R. Chandavarkar in SN Computer Science
    Article 10 December 2021
  12. Lightweight encryption scheme based on a new NLFSR

    This paper presents a new nonlinear feedback shift register (NLFSR) in the Galois configuration to generate the pseudorandom number sequences (PRNS)...

    Punam Kumari, Bhaskar Mondal in Multimedia Tools and Applications
    Article 18 January 2024
  13. Modeling for Three-Subset Division Property Without Unknown Subset

    A division property is a generic tool to search for integral distinguishers, and automatic tools such as MILP or SAT/SMT allow us to evaluate the...
    Yonglin Hao, Gregor Leander, ... Qingju Wang in Advances in Cryptology – EUROCRYPT 2020
    Conference paper 2020
  14. An AEAD Variant of the Grain Stream Cipher

    A new Grain stream cipher, denoted Grain-128AEAD is presented, with support for authenticated encryption with associated data. The cipher takes a...
    Martin Hell, Thomas Johansson, ... Hirotaka Yoshida in Codes, Cryptology and Information Security
    Conference paper 2019
  15. Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists

    We investigate the security of the NIST Lightweight Crypto Competition’s Finalists against side-channel attacks. We start with a mode-level analysis...
    Corentin Verhamme, Gaëtan Cassiers, François-Xavier Standaert in Smart Card Research and Advanced Applications
    Conference paper 2023
  16. Discussion on a new paradigm of endogenous security towards 6G networks

    The sixth-generation mobile communication (6G) networks will face more complex endogenous security problems, and it is urgent to propose new...

    **nsheng Ji, Jiangxing Wu, ... **g Yang in Frontiers of Information Technology & Electronic Engineering
    Article 24 October 2022
  17. Improved Graph-Based Model for Recovering Superpoly on Trivium

    Recovering superpoly for a given cube is the key step in cube attacks - an algebraic cryptanalysis method for symmetric ciphers. Since 2015, division...
    Junjie Cheng, Kexin Qiao in Topics in Cryptology – CT-RSA 2023
    Conference paper 2023
  18. Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC

    Secure multi-party computation (MPC) enables multiple distrusting parties to compute a function while kee** their respective inputs private. In a...
    Aysajan Abidin, Erik Pohle, Bart Preneel in Computer Security – ESORICS 2023
    Conference paper 2024
  19. Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output

    This paper presents an investigation into the resistance of linearly filtered nonlinear feedback shift registers (LF-NFSRs) against distinguishing...
    Matthew Beighton, Harry Bartlett, ... Kenneth Koon-Ho Wong in Applications and Techniques in Information Security
    Conference paper 2020
  20. An overview of cryptographic primitives for possible use in 5G and beyond

    This survey overviews the potential use of cryptographic primitives in the fifth-generation mobile communications system (aka 5G) and beyond. It...

    **g Yang, Thomas Johansson in Science China Information Sciences
    Article Open access 11 November 2020
Did you find what you were looking for? Share feedback.