Search
Search Results
-
Revised Version of Block Cipher CHAM
CHAM is a family of lightweight block ciphers published in 2017 [22]. The CHAM family consists of three ciphers, CHAM-64/128, CHAM-128/128, and... -
Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security
This paper proposes a lightweight authenticated encryption (AE) scheme, called Light-OCB, which can be viewed as a lighter variant of the CAESAR... -
Generalized Feistel Ciphers for Efficient Prime Field Masking
A recent work from Eurocrypt 2023 suggests that prime-field masking has excellent potential to improve the efficiency vs. security tradeoff of masked... -
FPGA Implementation of PICO Cipher
The rise in ubiquitous computing connecting resource-constrained devices had led to the emergence of a sub-domain in cryptography called lightweight... -
Implementation of AES Algorithm
AES, which stands for Advanced Encryption Standard is the most used symmetric block cipher based on the secured symmetric encryption algorithm. It... -
State-of-the-Art Lightweight Cryptographic Protocols for IoT Networks
Due to technical improvements, the Internet of Things has enabled the networking of devices capable of collecting vast volumes of data. Consequently,... -
Characterizing a Time–Memory Tradeoff Against PudgyTurtle
PudgyTurtle is not a cipher, but rather an alternative way to utilize the keystream in binary-additive stream-cipher cryptosystems. Instead of...
-
VLSI Implementation of BCH Encoder with Triple DES Encryption for Baseband Transceiver
This paper proposes the implementation of BCH Encoder in the ZYNQ-7000 AP SOC to guarantee the sensitive data that is acquired from capsule endoscopy... -
Authenticated Encryption Engine for IoT Application
With the increase of connected devices in IoT paradigm for various domains that include wireless sensor networks, edge computing, embedded systems.... -
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm
In this paper, we propose a GPU-accelerated branch-and-bound algorithm. The proposed approach substantially increases the performance of the... -
A Novel Image Encryption Technique Using Modified Grain-128
In this work, an alternative version to the stream cipher Grain-128 and an image encryption technique have been proposed. First, the new design is... -
Secure Communications by Using Atangana-Baleanu Fractional Derivative
In this chapter the authors propose to use fractional-order chaotic systemFractional-order chaotic system s for data encryption, the encryption is a... -
Cube attacks on round-reduced TinyJAMBU
Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal...
-
Image pixels swap** encryption based on the TetraVex game and a publicly hash-sharing algorithm
Traditionally, keys are generated using the hash value of the given image in the image cryptography to boost the security effects. The keys have been...
-
An S-box Design Using Irreducible Polynomial with Affine Transformation for Lightweight Cipher
Traditional cryptographic block cipher algorithms are often unsuitable for low-resource profiled IoT (Internet of Things) devices. A lightweight... -
A new encryption model for multimedia content using two dimensional Brownian motion and coupled map lattice
An image encryption model is presented in this paper. The model uses two-dimensional Brownian Motion as a source of confusion and diffusion in image...
-
Pholkos – Efficient Large-State Tweakable Block Ciphers from the AES Round Function
This paper proposes Pholkos, a family of heavyweight tweakable block ciphers with state and key sizes of... -
Novel secure data protection scheme using Martino homomorphic encryption
Globally, data maintenance and its security are vital tasks due to the rapid development of advanced technologies. Users now utilise Cloud computing...
-
A new dynamic DNA-coding model for gray-scale image encryption
To protect the images and provide a more secure cipher image, DNA encoding is crucial in image encryption. Applying a single, easily detectable...
-
Beyond Quadratic Speedups in Quantum Attacks on Symmetric Schemes
In this paper, we report the first quantum key-recovery attack on a symmetric block cipher design, using classical queries only, with a more than...