Cyberattacks and countermeasures for in-vehicle networks
As connectivity between and within vehicles increases, so does concern about safety and
security. Various automotive serial protocols are used inside vehicles such as Controller …
security. Various automotive serial protocols are used inside vehicles such as Controller …
Sensors for context-aware smart healthcare: A security perspective
The advances in the miniaturisation of electronic devices and the deployment of cheaper
and faster data networks have propelled environments augmented with contextual and real …
and faster data networks have propelled environments augmented with contextual and real …
Hawk: The blockchain model of cryptography and privacy-preserving smart contracts
Emerging smart contract systems over decentralized cryptocurrencies allow mutually
distrustful parties to transact safely without trusted third parties. In the event of contractual …
distrustful parties to transact safely without trusted third parties. In the event of contractual …
[PDF][PDF] Report on lightweight cryptography
K McKay, L Bassham, M Sönmez Turan, N Mouha - 2016 - csrc.nist.gov
NIST-approved cryptographic standards were designed to perform well using general-
purpose computers. In recent years, there has been increased deployment of small …
purpose computers. In recent years, there has been increased deployment of small …
Triathlon of lightweight block ciphers for the internet of things
In this paper, we introduce a framework for the benchmarking of lightweight block ciphers on
a multitude of embedded platforms. Our framework is able to evaluate the execution time …
a multitude of embedded platforms. Our framework is able to evaluate the execution time …
Quantum attacks without superposition queries: the offline Simon's algorithm
X Bonnetain, A Hosoyamada… - … Conference on the …, 2019 - Springer
In symmetric cryptanalysis, the model of superposition queries has led to surprising results,
with many constructions being broken in polynomial time thanks to Simon's period-finding …
with many constructions being broken in polynomial time thanks to Simon's period-finding …
Design Strategies for ARX with Provable Bounds: Sparx and LAX
We present, for the first time, a general strategy for designing ARX symmetric-key primitives
with provable resistance against single-trail differential and linear cryptanalysis. The latter …
with provable resistance against single-trail differential and linear cryptanalysis. The latter …
Gimli : A Cross-Platform Permutation
This paper presents Gimli, a 384-bit permutation designed to achieve high security with high
performance across a broad range of platforms, including 64-bit Intel/AMD server CPUs, 64 …
performance across a broad range of platforms, including 64-bit Intel/AMD server CPUs, 64 …
Machine learning-assisted differential distinguishers for lightweight ciphers
A Baksi, A Baksi - Classical and Physical Security of Symmetric Key …, 2022 - Springer
At CRYPTO'19, Gohr first introduces the deep learning-based cryptanalysis on round-
reduced SPECK. Using a deep residual network, Gohr trains several neural network-based …
reduced SPECK. Using a deep residual network, Gohr trains several neural network-based …
Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
In this paper, we focus on the automatic differential cryptanalysis of ARX block ciphers with
respect to XOR-difference, and develop Mouha et al.'s framework for finding differential …
respect to XOR-difference, and develop Mouha et al.'s framework for finding differential …