Search
Search Results
-
RAB: A lightweight block cipher algorithm with variable key length
With the increasing security issues of data transmitted from wireless sensor network terminals, the traditional cryptographic algorithms cannot meet...
-
RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment
Internet security has become a major concern with the growing use of the Internet of Things (IoT) and edge computing technologies. Even though data...
-
A lightweight and robust block cipher algorithm for real-time applications
Ensuring the protection of big data during transmission or storage represents a highly significant concern for both enterprises and individual users....
-
Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations
Currently, chaos-based cryptosystems are widely used for the reason of protecting sensitive data. Various different chaos-based cryptography systems...
-
SCENERY: a lightweight block cipher based on Feistel structure
In this paper, we propose a new lightweight block cipher called SCENERY. The main purpose of SCENERY design applies to hardware and software...
-
Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices
The internet of things (IoT) ensures flexible network services to the end devices connected to it. Although security has always been a concern for...
-
A reversible system based on hybrid toggle radius-4 cellular automata and its application as a block cipher
The one-dimensional cellular automata (CA) system detailed herein uses a hybrid mechanism to attain reversibility, and this approach is adapted to...
-
Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
Meet-in-the-middle (MitM) attack method has led to the best currently published cryptanalytic results on the AES block cipher in the single-key...
-
FPGA Implementation of SLIM an Ultra-Lightweight Block Cipher for IoT Applications
Increased security of radio frequency identification (RFIDRadio Frequency Identification (RFID)) systems which are resource-constrained devices is in... -
Design, Implementation and Analysis of HIBRI Cipher on IoT Platforms
With the exponential growth of the Internet of Things through time there has been an enormous increase in the usage of tiny devices and information...
-
FPGA implementation novel lightweight MBRISI cipher
The advancement Internet of things has led to an increasing exchange of information. Privacy and security has become a major concern. In this...
-
Comparative Study of Block Ciphers Implementation for Resource-Constrained Devices (Review)
AbstractLightweight cryptography (LWC) is critical for securing data between devices with limited resources. In this paper, we consider...
-
Design Principle and Method of Lightweight Block Cipher Diffusion Layer
Recently, due to the development and popularization of communication and computing technologies, new technologies have emerged one after another. The... -
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
We revisit designing AND-RX block ciphers, that is, the designs assembled with the most fundamental binary operations—AND, Rotation and XOR...
-
FUTURE: A Lightweight Block Cipher Using an Optimal Diffusion Matrix
In this work, we present FUTURE, a new 64-bit lightweight SPN-based block cipher. FUTURE encrypts data in a single clock cycle with a very low... -
Design of Nonlinear Component of Block Cipher Over Non-Chain Semi-Local Ring with its Application to Color Image Encryption
The innovative approach to encryption proposed in this manuscript is designed to increase the security of data in various applications. This approach...
-
Research on Differential Power Analysis of Lightweight Block Cipher LED
LED algorithm is a new lightweight encryption algorithm proposed in CHES 2011, which is used for IOT to protect the communication security of RFID... -
Advanced biometric system security: a novel hybrid approach integrating optical asymmetric PTFT and symmetric cipher techniques
The rapidly evolving field of biometric recognition and verification technologies has seen substantial progress recently. However, the storage of...
-
Algebraic fault analysis based on decomposition of higher-order nonlinear S-boxes in lightweight block ciphers
Nowadays, with the development of the Internet of Things and information security technologies, lightweight block ciphers are gradually being widely...
-
Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher
In the single-key attack scenario, meet-in-the-middle (MitM) attack method has led to the best currently published cryptanalytic results on the AES...