[PDF][PDF] Low Area PRESENT Cryptography in FPGA Using TRNGPRNG Key Generation

T Kowsalya, RG Babu… - … Materials & Continua, 2021 - researchgate.net
Lightweight Cryptography (LWC) is widely used to provide integrity, secrecy and
authentication for the sensitive applications. However, the LWC is vulnerable to various …

Designing an authenticated Hash function with a 2D chaotic map

LG De la Fraga, C Mancillas-López… - Nonlinear Dynamics, 2021 - Springer
This paper shows the use of four sets of coefficient values of the 2D chaotic map to generate
pseudo-random number generators. We demonstrate that the generated sequences are …

Extended logistic map for encryption of digital images

H Stanley, A Ramachandran - International Journal of Nonlinear …, 2022 - degruyter.com
A novel extended logistic map has been proposed and tested mathematically for security-
based applications. Because the designed extended logistic map behaves chaotically …

{Adiantum}: length-preserving encryption for entry-level processors

P Crowley, E Biggers - Cryptology ePrint Archive, 2018 - eprint.iacr.org
We present HBSH, a simple construction for tweakable length-preserving encryption which
supports the fastest options for hashing and stream encryption for processors without AES or …

ZCZ – Achieving n-bit SPRP Security with a Minimal Number of Tweakable-Block-Cipher Calls

R Bhaumik, E List, M Nandi - International Conference on the Theory and …, 2018 - Springer
Abstract Strong Pseudo-random Permutations (SPRP s) are important for various
applications. In general, it is desirable to base an SPRP on a single-keyed primitive for …

Strongbox: Confidentiality, integrity, and performance using stream ciphers for full drive encryption

B Dickens III, HS Gunawi, AJ Feldman… - Proceedings of the …, 2018 - dl.acm.org
Full-drive encryption (FDE) is especially important for mobile devices because they contain
large quantities of sensitive data yet are easily lost or stolen. Unfortunately, the standard …

FAST: disk encryption and beyond

D Chakraborty, S Ghosh, CM López… - Cryptology ePrint …, 2017 - eprint.iacr.org
This work introduces\sym {FAST} which is a new family of tweakable enciphering schemes.
Several instantiations of\sym {FAST} are described. These are targeted towards two goals …

Disk encryption: do we need to preserve length?

D Chakraborty, CM López, P Sarkar - Journal of Cryptographic …, 2018 - Springer
In the last one and a half decade there has been a lot of activity toward development of
cryptographic techniques for disk encryption. It has been almost canonized that an …

A stream/block combination image encryption algorithm using logistic matrix to scramble

XY Wang, ZM Li - International Journal of Nonlinear Sciences and …, 2019 - degruyter.com
In this paper, a new chaotic image encryption scheme is proposed, which uses the
combination of stream cipher and block cipher to spread and then uses the Logistic mapping …

Polynomial hashing over prime order fields

S Bhattacharyya, K Nath, P Sarkar - Advances in Mathematics of …, 2024 - aimsciences.org
This paper makes a comprehensive study of two important strategies for polynomial hashing
over a prime order field Fp, namely usual polynomial based hashing and hashing based on …