[PDF][PDF] Low Area PRESENT Cryptography in FPGA Using TRNGPRNG Key Generation
T Kowsalya, RG Babu… - … Materials & Continua, 2021 - researchgate.net
Lightweight Cryptography (LWC) is widely used to provide integrity, secrecy and
authentication for the sensitive applications. However, the LWC is vulnerable to various …
authentication for the sensitive applications. However, the LWC is vulnerable to various …
Designing an authenticated Hash function with a 2D chaotic map
LG De la Fraga, C Mancillas-López… - Nonlinear Dynamics, 2021 - Springer
This paper shows the use of four sets of coefficient values of the 2D chaotic map to generate
pseudo-random number generators. We demonstrate that the generated sequences are …
pseudo-random number generators. We demonstrate that the generated sequences are …
Extended logistic map for encryption of digital images
H Stanley, A Ramachandran - International Journal of Nonlinear …, 2022 - degruyter.com
A novel extended logistic map has been proposed and tested mathematically for security-
based applications. Because the designed extended logistic map behaves chaotically …
based applications. Because the designed extended logistic map behaves chaotically …
{Adiantum}: length-preserving encryption for entry-level processors
P Crowley, E Biggers - Cryptology ePrint Archive, 2018 - eprint.iacr.org
We present HBSH, a simple construction for tweakable length-preserving encryption which
supports the fastest options for hashing and stream encryption for processors without AES or …
supports the fastest options for hashing and stream encryption for processors without AES or …
ZCZ – Achieving n-bit SPRP Security with a Minimal Number of Tweakable-Block-Cipher Calls
Abstract Strong Pseudo-random Permutations (SPRP s) are important for various
applications. In general, it is desirable to base an SPRP on a single-keyed primitive for …
applications. In general, it is desirable to base an SPRP on a single-keyed primitive for …
Strongbox: Confidentiality, integrity, and performance using stream ciphers for full drive encryption
Full-drive encryption (FDE) is especially important for mobile devices because they contain
large quantities of sensitive data yet are easily lost or stolen. Unfortunately, the standard …
large quantities of sensitive data yet are easily lost or stolen. Unfortunately, the standard …
FAST: disk encryption and beyond
D Chakraborty, S Ghosh, CM López… - Cryptology ePrint …, 2017 - eprint.iacr.org
This work introduces\sym {FAST} which is a new family of tweakable enciphering schemes.
Several instantiations of\sym {FAST} are described. These are targeted towards two goals …
Several instantiations of\sym {FAST} are described. These are targeted towards two goals …
Disk encryption: do we need to preserve length?
D Chakraborty, CM López, P Sarkar - Journal of Cryptographic …, 2018 - Springer
In the last one and a half decade there has been a lot of activity toward development of
cryptographic techniques for disk encryption. It has been almost canonized that an …
cryptographic techniques for disk encryption. It has been almost canonized that an …
A stream/block combination image encryption algorithm using logistic matrix to scramble
XY Wang, ZM Li - International Journal of Nonlinear Sciences and …, 2019 - degruyter.com
In this paper, a new chaotic image encryption scheme is proposed, which uses the
combination of stream cipher and block cipher to spread and then uses the Logistic mapping …
combination of stream cipher and block cipher to spread and then uses the Logistic mapping …
Polynomial hashing over prime order fields
This paper makes a comprehensive study of two important strategies for polynomial hashing
over a prime order field Fp, namely usual polynomial based hashing and hashing based on …
over a prime order field Fp, namely usual polynomial based hashing and hashing based on …