State of the art in lightweight symmetric cryptography

A Biryukov, L Perrin - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Lightweight cryptography has been one of the" hot topics" in symmetric cryptography in the
recent years. A huge number of lightweight algorithms have been published, standardized …

Cyber security in new space: analysis of threats, key enabling technologies and challenges

M Manulis, CP Bridges, R Harrison, V Sekar… - International Journal of …, 2021 - Springer
Developments in technologies, attitudes and investment are transforming the space
environment, achieving greater accessibility for an increasing number of parties. New and …

Schoa: a newly fusion of sine and cosine with chimp optimization algorithm for hls of datapaths in digital filters and engineering applications

M Kaur, R Kaur, N Singh, G Dhiman - Engineering with Computers, 2022 - Springer
Abstract The Chimp optimization algorithm (ChoA) inspired by the individual intelligence
and sexual motivation of chimps in their group hunting, which is separate from the another …

[图书][B] Securing digital video: techniques for DRM and content protection

E Diehl - 2012 - books.google.com
Content protection and digital rights management (DRM) are fields that receive a lot of
attention: content owners require systems that protect and maximize their revenues; …

A distributed peer-to-peer storage network

R Kothari, B Jakheliya, V Sawant - … International Conference on …, 2019 - ieeexplore.ieee.org
With increase in the amount of data generated every day, there is a need for more storage
space in our mobile phones. Users have to manage their storage space by frequently …

Cryptanalysis, reverse-engineering and design of symmetric cryptographic algorithms

LP Perrin - 2017 - orbilu.uni.lu
In this thesis, I present the research I did with my co-authors on several aspects of symmetric
cryptography from May 2013 to December 2016, that is, when I was a PhD student at the …

Fault attack on the DVB common scrambling algorithm

K Wirt - Computational Science and Its Applications–ICCSA …, 2005 - Springer
Abstract The Common Scrambling Algorithm (CSA) is used to encrypt streams of video data
in the Digital Video Broadcasting (DVB) system. The algorithm uses a combination of a …

[PDF][PDF] Cryptanalysis of hummingbird-2

K Zhang, L Ding, J Guan - IACR Crypt. ePrint Arc, 2012 - Citeseer
Hummingbird is a lightweight encryption and message authentication primitive published in
RISC'09 and WLC'10. In FSE'11, Markku-Juhani O. Saarinen presented a differential divide …

Implementation of a distributed p2p storage network

R Kothari, B Jakheliya, V Sawant - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Due to the large proportion of data generated daily, an additional storage capacity is
required for our mobile devices. Currently, storage space management is done by frequent …

Lightweight image encryption: a chaotic ARX block cipher

N Mohananthini, MY Mohamed Parvees… - Journal of Circuits …, 2021 - World Scientific
Nowadays, lightweight cryptography attracts academicians, scientists and researchers to
concentrate on its requisite with the increasing usage of low resource devices. In this paper …