Triathlon of lightweight block ciphers for the internet of things

D Dinu, YL Corre, D Khovratovich, L Perrin… - Journal of Cryptographic …, 2019 - Springer
In this paper, we introduce a framework for the benchmarking of lightweight block ciphers on
a multitude of embedded platforms. Our framework is able to evaluate the execution time …

LS-designs: Bitslice encryption for efficient masked software implementations

V Grosso, G Leurent, FX Standaert, K Varıcı - … 2014, London, UK, March 3-5 …, 2015 - Springer
Side-channel analysis is an important issue for the security of embedded cryptographic
devices, and masking is one of the most investigated solutions to mitigate such attacks. In …

[HTML][HTML] LEDPatNet19: Automated emotion recognition model based on nonlinear LED pattern feature extraction function using EEG signals

T Tuncer, S Dogan, A Subasi - Cognitive Neurodynamics, 2022 - Springer
Electroencephalography (EEG) signals collected from human brains have generally been
used to diagnose diseases. Moreover, EEG signals can be used in several areas such as …

Block ciphers that are easier to mask: How far can we go?

B Gérard, V Grosso, M Naya-Plasencia… - … and Embedded Systems …, 2013 - Springer
The design and analysis of lightweight block ciphers has been a very active research area
over the last couple of years, with many innovative proposals trying to optimize different …

Survey and benchmark of lightweight block ciphers for wireless sensor networks

M Cazorla, K Marquet, M Minier - 2013 international conference …, 2013 - ieeexplore.ieee.org
For security applications in wireless sensor networks (WSNs), choosing best algorithms in
terms of energy-efficiency and of small memory requirements is a real challenge because …

Differential cryptanalysis in the fixed-key model

T Beyne, V Rijmen - Annual International Cryptology Conference, 2022 - Springer
A systematic approach to the fixed-key analysis of differential probabilities is proposed. It is
based on the propagation of 'quasidifferential trails', which keep track of probabilistic linear …

An encryption scheme using chaotic map and genetic operations for wireless sensor networks

K Biswas, V Muthukkumarasamy… - IEEE Sensors …, 2014 - ieeexplore.ieee.org
Over the past decade, the application domain of wireless sensor networks has expanded
steadily, ranging from environmental management to industry control, and from structural …

Cryptanalysis of Round-Reduced

I Nikolić, L Wang, S Wu - International Workshop on Fast Software …, 2013 - Springer
In this paper we present known-plaintext single-key and chosen-key attacks on round-
reduced LED-64 and LED-128. We show that with an application of the recently proposed …

Differential and linear cryptanalysis of reduced-round SIMON

F Abed, E List, S Lucks, J Wenzel - Cryptology ePrint Archive, 2013 - eprint.iacr.org
This paper presents differential attacks of round-reduced versions of Simon with up to 18/32,
19/36, 25/44, 35/54, and 46/72 rounds for the 32-, 48-, 64-, 96-, and 128-bit versions …

Cryptanalysis of full Sprout

V Lallemand, M Naya-Plasencia - Annual Cryptology Conference, 2015 - Springer
A new method for reducing the internal state size of stream cipher registers has been
proposed in FSE 2015, allowing to reduce the area in hardware implementations. Along with …