Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks
Z Niu, S Sun, Y Liu, C Li - Annual International Cryptology Conference, 2022 - Springer
… Chaskey is deployed in commercial products by some … micro-controller platforms (8-bit AVR,
16-bit MSP, and 32-bit … additions often operate on large words (eg, 32-bit or 64-bit words). In …
16-bit MSP, and 32-bit … additions often operate on large words (eg, 32-bit or 64-bit words). In …
Lightweight cryptography for the Internet of Things
A Hassan - Proceedings of the Future Technologies Conference …, 2021 - Springer
… Most of the IoT devices use very low power microcontrollers, so, these devices can give a …
very specialized algorithms, Examples of this classification are Grain, Qarma, and Chaskey. …
very specialized algorithms, Examples of this classification are Grain, Qarma, and Chaskey. …
: Towards More Efficient and BBB-secure AE From a Single Public Permutation
… our proposal on ARM-32 microcontrollers with Chaskey8 [31] and two … on 32-bit
microcontrollers and evaluate its efficiency with respect to … Chaskey: An Efficient MAC Algorithm for …
microcontrollers and evaluate its efficiency with respect to … Chaskey: An Efficient MAC Algorithm for …
Improving Differential-Neural Distinguisher Model For DES, Chaskey, and PRESENT
… To capture the features of the internal architecture of the cryptographic algorithm, we add
the … Chaskey: An efficient MAC algorithm for 32-bit microcontrollers. volume 8781 of Lecture …
the … Chaskey: An efficient MAC algorithm for 32-bit microcontrollers. volume 8781 of Lecture …
Implementing CAN bus security by TOUCAN
… Because the MAC must be truncated to 24 bits, the truncation resistance of Chaskey is a …
Table 1 shows the algorithms used, the board speed and the execution time of each operation …
Table 1 shows the algorithms used, the board speed and the execution time of each operation …
Lightweight cryptography
… for 8-bit AVR microcontrollers, and TDES is appropriate for … algorithms optimized separately
for hardware and software, which illustrates the difficulty of designing an efficient algorithm …
for hardware and software, which illustrates the difficulty of designing an efficient algorithm …
Analysis of Functional Safety in a secure implementation of CAN Protocol
… the Chaskey MAC, which is a very efficient permutation-based MAC algorithm based on …
does not require a nonce and is well suited for 32-bit micro-controllers; furthermore, it is robust …
does not require a nonce and is well suited for 32-bit micro-controllers; furthermore, it is robust …
Hitchhiker's Guide to Secure Checkpointing on Energy-Harvesting Systems
… traces to monitor communication between the microcontroller and external memory chips.
This … implementation of cryptographic algorithm Chaskey [42] and no optimization enabled. …
This … implementation of cryptographic algorithm Chaskey [42] and no optimization enabled. …
Cyberattacks and countermeasures for in-vehicle networks
… They also use a compression algorithm to improve the efficiency of their … Chaskey MAC
algorithm [91] over limited-capacity computational resources such as a 32-bit microcontroller…
algorithm [91] over limited-capacity computational resources such as a 32-bit microcontroller…
Examining vulnerability of hls-designed chaskey-12 circuits to power side-channel attacks
S Inagaki, M Yang, Y Li, K Sakiyama… - … on Quality Electronic …, 2022 - ieeexplore.ieee.org
… Chaskey [2] is one of such lightweight MAC algorithms and one of its variants, Chaskey-12 …
Even though mathematically robust cipher algorithms (including Chaskey) are adopted for …
Even though mathematically robust cipher algorithms (including Chaskey) are adopted for …