ShiftRows alternatives for AES-like ciphers and optimal cell permutations for Midori and Skinny
We study possible alternatives for ShiftRows to be used as cell permutations in AES-like
ciphers. As observed during the design process of the block cipher Midori, when using a …
ciphers. As observed during the design process of the block cipher Midori, when using a …
Design and analysis of symmetric primitives
MM Lauridsen - 2016 - orbit.dtu.dk
Design and Analysis of Symmetric Primitives Page 1 General rights Copyright and moral rights
for the publications made accessible in the public portal are retained by the authors and/or …
for the publications made accessible in the public portal are retained by the authors and/or …
Upper bound of the length of truncated impossible differentials for AES
Q Wang, C Jin - Designs, Codes and Cryptography, 2018 - Springer
On the provable security of a block cipher against impossible differential cryptanalysis, the
maximal length of impossible differentials is an essential aspect. Most previous work on …
maximal length of impossible differentials is an essential aspect. Most previous work on …
Symmetric encryption relying on chaotic henon system for secure hardware-friendly wireless communication of implantable medical systems
Healthcare remote devices are recognized as a promising technology for treating health
related issues. Among them are the wireless Implantable Medical Devices (IMDs): These …
related issues. Among them are the wireless Implantable Medical Devices (IMDs): These …
Light-weight solution to defend implantable medical devices against man-in-the-middle attack
Nowadays, Implantable Medical Devices (IMDs) rely mainly on wireless technology for
information exchange. In spite of the many advantages wireless technology offers to patients …
information exchange. In spite of the many advantages wireless technology offers to patients …
Pen and paper arguments for SIMON and SIMON-like designs
C Beierle - International Conference on Security and Cryptography …, 2016 - Springer
In this work, we analyze the resistance of Simon-like ciphers against differential attacks
without using computer-aided methods. In this context, we first define the notion of a Simon …
without using computer-aided methods. In this context, we first define the notion of a Simon …
SoK: Security Evaluation of SBox-Based Block Ciphers
J Lim, D Ng, R Ng - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Cryptanalysis of block ciphers is an active and important research area with an extensive
volume of literature. For this work, we focus on SBox-based ciphers, as they are widely used …
volume of literature. For this work, we focus on SBox-based ciphers, as they are widely used …
A Method to Bound the Number of Active S-Boxes for a Kind of AES-Like Structure
Q Wang, C Jin - The Computer Journal, 2019 - academic.oup.com
Due to the strong security and high performance of the AES block cipher, many hash
functions take AES-like structures as building blocks. To evaluate the security of these AES …
functions take AES-like structures as building blocks. To evaluate the security of these AES …
[PDF][PDF] Authorization to Submit Thesis
T Bartholomaus - 2020 - objects.lib.uidaho.edu
The retreat and advance of marine-terminating outlet glaciers in Greenland plays a critical
role in modulating ice sheet mass balance. However, the frontal ablation processes that …
role in modulating ice sheet mass balance. However, the frontal ablation processes that …
[PDF][PDF] Generación Aleatoria de Permutaciones con Óptima Difusión
AA Peñate - researchgate.net
El propósito de este trabajo es crear un algoritmo para la generación de permutaciones con
óptima difusión. Este tipo de permutaciones, usadas en el cifrador de bloques AES como la …
óptima difusión. Este tipo de permutaciones, usadas en el cifrador de bloques AES como la …