We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 124 results
  1. Fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple errors detection

    In this paper, fault-tolerant and error-correcting 4-bit S-boxes for cryptography applications with multiple error detection and correction are...

    Bahram Rashidi in The Journal of Supercomputing
    Article 18 July 2023
  2. An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices

    Blockchain is among the most promising new technologies due to its unique features, encompassing security, privacy, data integrity, and immutability....

    Sa’ed Abed, Reem Jaffal, ... Mohammad Al-Shayeji in Cluster Computing
    Article 06 June 2021
  3. Tight Preimage Resistance of the Sponge Construction

    The cryptographic sponge is a popular method for hash function design. The construction is in the ideal permutation model proven to be...
    Charlotte Lefevre, Bart Mennink in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  4. Simplified MITM Modeling for Permutations: New (Quantum) Attacks

    Meet-in-the-middle (MITM) is a general paradigm where internal states are computed along two independent paths (‘forwards’ and ‘backwards’) that are...
    André Schrottenloher, Marc Stevens in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  5. HVH: A Lightweight Hash Function Based on Dual Pseudo-Random Transformation

    Along with the popularization of RFID technology and wireless sensor network, it has been more and more difficult for common hash-functions to meet...
    Conference paper 2021
  6. The Theory and Practice of Magic Hash Based Attacks on Lightweight Cryptographic Hash Functions in Complex IoT Environments

    In this paper a new type of application layer attack against complex IoT environments is presented which is based on unsafe typecasting and loose...
    Conference paper 2021
  7. Statistical Tests for Symmetric Primitives

    In this work, we show the results of the NIST statistical tests performed on different datasets generated from the output of all possible...
    Emanuele Bellini, Yun Ju Huang, Mohamed Rachidi in Innovative Security Solutions for Information Technology and Communications
    Conference paper 2023
  8. High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform

    Authenticated encryption with associated data (AEAD) has become prominent over time because it offers authenticity and confidentiality...

    Jia-Lin Chan, Wai-Kong Lee, ... Bok-Min Goi in Cluster Computing
    Article 20 May 2024
  9. Resource-Aware Cryptography: An Analysis of Lightweight Cryptographic Primitives

    With the increased use of highly constrained interconnected devices in various areas like healthcare, sensor networks, the internet of things (IoT),...

    Mohammed Rushad, Akshat Nambiar, B. R. Chandavarkar in SN Computer Science
    Article 10 December 2021
  10. Blind Side Channel Analysis on the Elephant LFSR Extended Version

    The National Institute of Standards and Technology (NIST) started a competition for lightweight cryptography candidates for authenticated encryption....
    Julien Maillard, Awaleh Houssein Meraneh, ... Gaël Thomas in E-Business and Telecommunications
    Conference paper 2023
  11. Homomorphic Evaluation of Lightweight Cipher Boolean Circuits

    Motivated by a number of applications of lightweight ciphers in privacy-enhancing cryptography (PEC) techniques such as secure multiparty computation...
    Kalikinkar Mandal, Guang Gong in Foundations and Practice of Security
    Conference paper 2022
  12. Modeling, hardware architecture, and performance analyses of an AEAD-based lightweight cipher

    Ensuring data security and integrity is crucial for achieving the highest level of protection and performance in modern cyber-physical systems (CPS)....

    Kartik Jhawar, Jugal Gandhi, ... Jai Gopal Pandey in Journal of Real-Time Image Processing
    Article 15 February 2024
  13. Blind Side Channel Analysis Against AEAD with a Belief Propagation Approach

    This paper present two new attacks on two lightweight authenticated encryption with associated data (AEAD): Sparkle and...
    Modou Sarry, Hélène Le Bouder, ... Gaël Thomas in Smart Card Research and Advanced Applications
    Conference paper 2024
  14. Lightweight micro-architecture for IoT & FPGA security

    Cryptographic standards were created with the goal of being able to work on a wide range of systems. Small computing systems with limited capacity to...

    Rajdeep Chakraborty, Uttam Kr. Mondal, ... Bibek Bikash Roy in International Journal of Information Technology
    Article 05 September 2023
  15. FSR-SPD: an efficient chaotic multi-image encryption system based on flip-shift-rotate synchronous-permutation-diffusion operation

    Images are a crucial component in contemporary data transmission. Numerous images are transmitted daily through the open-source network. This paper...

    Ankita Raghuvanshi, Muskan Budhia, ... Bibhudendra Acharya in Multimedia Tools and Applications
    Article Open access 15 December 2023
  16. Practical Homomorphic Evaluation of Block-Cipher-Based Hash Functions with Applications

    Fully homomorphic encryption (FHE) is a powerful cryptographic technique allowing to perform computation directly over encrypted data. Motivated by...
    Adda Akram Bendoukha, Oana Stan, ... Luciano Freitas in Foundations and Practice of Security
    Conference paper 2023
  17. Thinking Outside the Superbox

    Designing a block cipher or cryptographic permutation can be approached in many different ways. One such approach, popularized by AES, consists in...
    Nicolas Bordes, Joan Daemen, ... Gilles Van Assche in Advances in Cryptology – CRYPTO 2021
    Conference paper 2021
  18. Authenticated Encryption Based on Lesamnta-LW Hashing Mode

    Authenticated encryption refers to symmetric cryptography providing both privacy and authenticity. It is most common to construct it as a...
    Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida in Information Security and Cryptology – ICISC 2019
    Conference paper 2020
  19. Modified lightweight cryptography scheme and its applications in IoT environment

    Interconnected devices have been with us for a long time. The security of the data exchanged through these devices is a matter of grave concern....

    Nilufar Yasmin, Richa Gupta in International Journal of Information Technology
    Article 26 September 2023
  20. Breaking LWC candidates: sESTATE and Elephant in quantum setting

    The competition for lightweight cryptography (LWC) launched by the National Institute of Standards and Technology (NIST) is an ongoing project...

    Tairong Shi, Wenling Wu, ... Sengpeng Wang in Designs, Codes and Cryptography
    Article 30 April 2021
Did you find what you were looking for? Share feedback.