Triathlon of lightweight block ciphers for the internet of things
In this paper, we introduce a framework for the benchmarking of lightweight block ciphers on
a multitude of embedded platforms. Our framework is able to evaluate the execution time …
a multitude of embedded platforms. Our framework is able to evaluate the execution time …
LS-designs: Bitslice encryption for efficient masked software implementations
Side-channel analysis is an important issue for the security of embedded cryptographic
devices, and masking is one of the most investigated solutions to mitigate such attacks. In …
devices, and masking is one of the most investigated solutions to mitigate such attacks. In …
[HTML][HTML] LEDPatNet19: Automated emotion recognition model based on nonlinear LED pattern feature extraction function using EEG signals
Electroencephalography (EEG) signals collected from human brains have generally been
used to diagnose diseases. Moreover, EEG signals can be used in several areas such as …
used to diagnose diseases. Moreover, EEG signals can be used in several areas such as …
Block ciphers that are easier to mask: How far can we go?
B Gérard, V Grosso, M Naya-Plasencia… - … and Embedded Systems …, 2013 - Springer
The design and analysis of lightweight block ciphers has been a very active research area
over the last couple of years, with many innovative proposals trying to optimize different …
over the last couple of years, with many innovative proposals trying to optimize different …
Survey and benchmark of lightweight block ciphers for wireless sensor networks
For security applications in wireless sensor networks (WSNs), choosing best algorithms in
terms of energy-efficiency and of small memory requirements is a real challenge because …
terms of energy-efficiency and of small memory requirements is a real challenge because …
Differential cryptanalysis in the fixed-key model
A systematic approach to the fixed-key analysis of differential probabilities is proposed. It is
based on the propagation of 'quasidifferential trails', which keep track of probabilistic linear …
based on the propagation of 'quasidifferential trails', which keep track of probabilistic linear …
An encryption scheme using chaotic map and genetic operations for wireless sensor networks
K Biswas, V Muthukkumarasamy… - IEEE Sensors …, 2014 - ieeexplore.ieee.org
Over the past decade, the application domain of wireless sensor networks has expanded
steadily, ranging from environmental management to industry control, and from structural …
steadily, ranging from environmental management to industry control, and from structural …
Cryptanalysis of Round-Reduced
I Nikolić, L Wang, S Wu - International Workshop on Fast Software …, 2013 - Springer
In this paper we present known-plaintext single-key and chosen-key attacks on round-
reduced LED-64 and LED-128. We show that with an application of the recently proposed …
reduced LED-64 and LED-128. We show that with an application of the recently proposed …
Differential and linear cryptanalysis of reduced-round SIMON
This paper presents differential attacks of round-reduced versions of Simon with up to 18/32,
19/36, 25/44, 35/54, and 46/72 rounds for the 32-, 48-, 64-, 96-, and 128-bit versions …
19/36, 25/44, 35/54, and 46/72 rounds for the 32-, 48-, 64-, 96-, and 128-bit versions …
Cryptanalysis of full Sprout
V Lallemand, M Naya-Plasencia - Annual Cryptology Conference, 2015 - Springer
A new method for reducing the internal state size of stream cipher registers has been
proposed in FSE 2015, allowing to reduce the area in hardware implementations. Along with …
proposed in FSE 2015, allowing to reduce the area in hardware implementations. Along with …