Cyberattacks and countermeasures for in-vehicle networks
As connectivity between and within vehicles increases, so does concern about safety and
security. Various automotive serial protocols are used inside vehicles such as Controller …
security. Various automotive serial protocols are used inside vehicles such as Controller …
[HTML][HTML] Sensors for context-aware smart healthcare: A security perspective
The advances in the miniaturisation of electronic devices and the deployment of cheaper
and faster data networks have propelled environments augmented with contextual and real …
and faster data networks have propelled environments augmented with contextual and real …
Hawk: The blockchain model of cryptography and privacy-preserving smart contracts
Emerging smart contract systems over decentralized cryptocurrencies allow mutually
distrustful parties to transact safely without trusted third parties. In the event of contractual …
distrustful parties to transact safely without trusted third parties. In the event of contractual …
[PDF][PDF] Report on lightweight cryptography
K McKay, L Bassham, M Sönmez Turan, N Mouha - 2016 - csrc.nist.gov
NIST-approved cryptographic standards were designed to perform well using general-
purpose computers. In recent years, there has been increased deployment of small …
purpose computers. In recent years, there has been increased deployment of small …
Quantum attacks without superposition queries: the offline Simon's algorithm
X Bonnetain, A Hosoyamada… - … Conference on the …, 2019 - Springer
In symmetric cryptanalysis, the model of superposition queries has led to surprising results,
with many constructions being broken in polynomial time thanks to Simon's period-finding …
with many constructions being broken in polynomial time thanks to Simon's period-finding …
Triathlon of lightweight block ciphers for the internet of things
In this paper, we introduce a framework for the benchmarking of lightweight block ciphers on
a multitude of embedded platforms. Our framework is able to evaluate the execution time …
a multitude of embedded platforms. Our framework is able to evaluate the execution time …
Design Strategies for ARX with Provable Bounds: Sparx and LAX
We present, for the first time, a general strategy for designing ARX symmetric-key primitives
with provable resistance against single-trail differential and linear cryptanalysis. The latter …
with provable resistance against single-trail differential and linear cryptanalysis. The latter …
Machine learning-assisted differential distinguishers for lightweight ciphers
A Baksi, A Baksi - Classical and Physical Security of Symmetric Key …, 2022 - Springer
At CRYPTO'19, Gohr first introduces the deep learning-based cryptanalysis on round-
reduced SPECK. Using a deep residual network, Gohr trains several neural network-based …
reduced SPECK. Using a deep residual network, Gohr trains several neural network-based …
Gimli : A Cross-Platform Permutation
This paper presents Gimli, a 384-bit permutation designed to achieve high security with high
performance across a broad range of platforms, including 64-bit Intel/AMD server CPUs, 64 …
performance across a broad range of platforms, including 64-bit Intel/AMD server CPUs, 64 …
Improved differential-linear attacks with applications to ARX ciphers
C Beierle, M Broll, F Canale, N David… - Journal of …, 2022 - Springer
Improved Differential-Linear Attacks with Applications to ARX Ciphers | Journal of Cryptology
Skip to main content SpringerLink Account Menu Find a journal Publish with us Track your …
Skip to main content SpringerLink Account Menu Find a journal Publish with us Track your …