Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES (L) and other bit-oriented block …
We propose two systematic methods to describe the differential property of an S-box with
linear inequalities based on logical condition modelling and computational geometry …
linear inequalities based on logical condition modelling and computational geometry …
ASIC and FPGA comparative study for IoT lightweight hardware security algorithms
N Samir, AS Hussein, M Khaled… - Journal of Circuits …, 2019 - World Scientific
Data security, privacy and authenticity are crucial in wireless data transmission. Low power
consumption is the main requirement for any chip design targeting the Internet of Things …
consumption is the main requirement for any chip design targeting the Internet of Things …
Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with …
In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of the
differential and linear behavior of a wide range of block ciphers. We point out that the …
differential and linear behavior of a wide range of block ciphers. We point out that the …
Lightweight MDS involution matrices
In this article, we provide new methods to look for lightweight MDS matrices, and in
particular involutory ones. By proving many new properties and equivalence classes for …
particular involutory ones. By proving many new properties and equivalence classes for …
A new structural-differential property of 5-round AES
L Grassi, C Rechberger, S Rønjom - … on the Theory and Applications of …, 2017 - Springer
AES is probably the most widely studied and used block cipher. Also versions with a
reduced number of rounds are used as a building block in many cryptographic schemes, eg …
reduced number of rounds are used as a building block in many cryptographic schemes, eg …
Shorter linear straight-line programs for MDS matrices
Recently a lot of attention is paid to the search for efficiently implementable MDS matrices for
lightweight symmetric primitives. Most previous work concentrated on locally optimizing the …
lightweight symmetric primitives. Most previous work concentrated on locally optimizing the …
[HTML][HTML] A novel 5-bit S-box design for lightweight cryptography algorithms
VA Thakor, MA Razzaque, AD Darji, AR Patel - Journal of Information …, 2023 - Elsevier
Cryptography is one of the techniques to secure communication and data transfer over the
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …
Lightweight MDS generalized circulant matrices
M Liu, SM Sim - International Conference on Fast Software Encryption, 2016 - Springer
In this article, we analyze the circulant structure of generalized circulant matrices to reduce
the search space for finding lightweight MDS matrices. We first show that the implementation …
the search space for finding lightweight MDS matrices. We first show that the implementation …
ISAP–towards side-channel secure authenticated encryption
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a
serious threat to cryptographic implementations. One approach to counteract such attacks …
serious threat to cryptographic implementations. One approach to counteract such attacks …