We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,728 results
  1. RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment

    Internet security has become a major concern with the growing use of the Internet of Things (IoT) and edge computing technologies. Even though data...

    Sohel Rana, M. Rubaiyat Hossain Mondal, Joarder Kamruzzaman in Cybersecurity
    Article Open access 01 February 2023
  2. A lightweight and robust block cipher algorithm for real-time applications

    Ensuring the protection of big data during transmission or storage represents a highly significant concern for both enterprises and individual users....

    Amal Hafsa, Mohamed Gafsi, Mohsen Machhout in Signal, Image and Video Processing
    Article 26 November 2023
  3. Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations

    Currently, chaos-based cryptosystems are widely used for the reason of protecting sensitive data. Various different chaos-based cryptography systems...

    Rim Amdouni, Mohamed Gafsi, ... Abdellatif Mtibaa in Multimedia Tools and Applications
    Article 18 March 2023
  4. SCENERY: a lightweight block cipher based on Feistel structure

    In this paper, we propose a new lightweight block cipher called SCENERY. The main purpose of SCENERY design applies to hardware and software...

    **gya Feng, Lang Li in Frontiers of Computer Science
    Article 11 November 2021
  5. Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices

    The internet of things (IoT) ensures flexible network services to the end devices connected to it. Although security has always been a concern for...

    Nilufar Yasmin, Richa Gupta in International Journal of Information Technology
    Article 11 September 2023
  6. A reversible system based on hybrid toggle radius-4 cellular automata and its application as a block cipher

    The one-dimensional cellular automata (CA) system detailed herein uses a hybrid mechanism to attain reversibility, and this approach is adapted to...

    Everton R. Lira, Heverton B. de Macêdo, ... Gina M. B. Oliveira in Natural Computing
    Article 25 March 2023
  7. Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher

    Meet-in-the-middle (MitM) attack method has led to the best currently published cryptanalytic results on the AES block cipher in the single-key...

    Jiqiang Lu, Wenchang Zhou in Designs, Codes and Cryptography
    Article 24 November 2023
  8. SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations

    We revisit designing AND-RX block ciphers, that is, the designs assembled with the most fundamental binary operations—AND, Rotation and XOR...

    Shiyao Chen, Yanhong Fan, ... Chun Guo in Designs, Codes and Cryptography
    Article 19 November 2021
  9. FUTURE: A Lightweight Block Cipher Using an Optimal Diffusion Matrix

    In this work, we present FUTURE, a new 64-bit lightweight SPN-based block cipher. FUTURE encrypts data in a single clock cycle with a very low...
    Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta in Progress in Cryptology - AFRICACRYPT 2022
    Conference paper 2022
  10. Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher

    In the single-key attack scenario, meet-in-the-middle (MitM) attack method has led to the best currently published cryptanalytic results on the AES...
    Jiqiang Lu, Wenchang Zhou in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
  11. Quantum Query Lower Bounds for Key Recovery Attacks on the Even-Mansour Cipher

    The Even-Mansour (EM) cipher is one of the famous constructions for a block cipher. Kuwakado and Morii demonstrated that a quantum adversary can...
    Akinori Kawachi, Yuki Naito in Computing and Combinatorics
    Conference paper 2024
  12. The Cipher Bureau: Early Days

    Herbert Yardley proceeds to set up his new Cipher Bureau in New York City. His original plans and budget run up against Congress’s determination to...
    John F. Dooley in The Gambler and the Scholars
    Chapter 2023
  13. An image cipher based on bio-molecular hyper chaotic system with dual diffusion scheme

    Sensitive images are being transmitted over insecure media as network and information technology evolve at a rapid pace. As a result, people are...

    Sujarani Rajendran, Manivannan Doraipandian, ... Kannan Kirthivasan in Multimedia Tools and Applications
    Article 10 October 2023
  14. WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher

    In this article, we present WARP, a lightweight 128-bit block cipher with a 128-bit key. It aims at small-footprint circuit in the field of 128-bit...
    Subhadeep Banik, Zhenzhen Bao, ... Maki Shigeri in Selected Areas in Cryptography
    Conference paper 2021
  15. FASTA – A Stream Cipher for Fast FHE Evaluation

    In this paper we propose Fasta, a stream cipher design optimised for implementation over popular fully homomorphic encryption schemes. A number of...
    Carlos Cid, John Petter Indrøy, Håvard Raddum in Topics in Cryptology – CT-RSA 2022
    Conference paper 2022
  16. Security Challenges and Lightweight Cryptography in IoT: Comparative Study and Testing Method for PRESENT-32bit Cipher

    The Internet of Things (IoT) stands out as one of the most remarkable innovations in recent times, offering a promising future for global...
    Van Nam Ngo, Anh Ngoc Le, Do-Hyeun Kim in Parallel and Distributed Computing, Applications and Technologies
    Conference paper 2024
  17. Lightweight architecture for fault detection in Simeck cryptographic algorithms on FPGA

    Internet of Things (IoT) laid the roadmap for vast data exchange in-between resource-constrained devices such as RFID tags and nanosensors. The...

    Prachin Bhoyar, Parul Sahare, ... Raghavendra Deshmukh in International Journal of Information Technology
    Article 27 November 2023
  18. Output Prediction Attacks on Block Ciphers Using Deep Learning

    In this paper, we propose deep learning-based output prediction attacks in a blackbox setting. As preliminary experiments, we first focus on two toy...
    Hayato Kimura, Keita Emura, ... Toshihiro Ohigashi in Applied Cryptography and Network Security Workshops
    Conference paper 2022
  19. Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB

    In this paper, we analyze the security of two recently proposed ultra-lightweight block ciphers, SLIM and LCB. SLIM is designed based on the Feistel...
    Yen Yee Chan, Cher-Yin Khor, ... Norziana Jamil in Emerging Information Security and Applications
    Conference paper 2022
  20. An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families

    Simon and Speck are two block cipher families published in 2013 by the US National Security Agency (NSA). These block ciphers, targeting lightweight...
    Tomer Ashur, Atul Luykx in Security of Ubiquitous Computing Systems
    Chapter Open access 2021
Did you find what you were looking for? Share feedback.