State of the art in lightweight symmetric cryptography
A Biryukov, L Perrin - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Lightweight cryptography has been one of the" hot topics" in symmetric cryptography in the
recent years. A huge number of lightweight algorithms have been published, standardized …
recent years. A huge number of lightweight algorithms have been published, standardized …
Cyber security in new space: analysis of threats, key enabling technologies and challenges
Developments in technologies, attitudes and investment are transforming the space
environment, achieving greater accessibility for an increasing number of parties. New and …
environment, achieving greater accessibility for an increasing number of parties. New and …
Schoa: a newly fusion of sine and cosine with chimp optimization algorithm for hls of datapaths in digital filters and engineering applications
Abstract The Chimp optimization algorithm (ChoA) inspired by the individual intelligence
and sexual motivation of chimps in their group hunting, which is separate from the another …
and sexual motivation of chimps in their group hunting, which is separate from the another …
[图书][B] Securing digital video: techniques for DRM and content protection
E Diehl - 2012 - books.google.com
Content protection and digital rights management (DRM) are fields that receive a lot of
attention: content owners require systems that protect and maximize their revenues; …
attention: content owners require systems that protect and maximize their revenues; …
A distributed peer-to-peer storage network
With increase in the amount of data generated every day, there is a need for more storage
space in our mobile phones. Users have to manage their storage space by frequently …
space in our mobile phones. Users have to manage their storage space by frequently …
Cryptanalysis, reverse-engineering and design of symmetric cryptographic algorithms
LP Perrin - 2017 - orbilu.uni.lu
In this thesis, I present the research I did with my co-authors on several aspects of symmetric
cryptography from May 2013 to December 2016, that is, when I was a PhD student at the …
cryptography from May 2013 to December 2016, that is, when I was a PhD student at the …
Fault attack on the DVB common scrambling algorithm
K Wirt - Computational Science and Its Applications–ICCSA …, 2005 - Springer
Abstract The Common Scrambling Algorithm (CSA) is used to encrypt streams of video data
in the Digital Video Broadcasting (DVB) system. The algorithm uses a combination of a …
in the Digital Video Broadcasting (DVB) system. The algorithm uses a combination of a …
[PDF][PDF] Cryptanalysis of hummingbird-2
K Zhang, L Ding, J Guan - IACR Crypt. ePrint Arc, 2012 - Citeseer
Hummingbird is a lightweight encryption and message authentication primitive published in
RISC'09 and WLC'10. In FSE'11, Markku-Juhani O. Saarinen presented a differential divide …
RISC'09 and WLC'10. In FSE'11, Markku-Juhani O. Saarinen presented a differential divide …
Implementation of a distributed p2p storage network
Due to the large proportion of data generated daily, an additional storage capacity is
required for our mobile devices. Currently, storage space management is done by frequent …
required for our mobile devices. Currently, storage space management is done by frequent …
Lightweight image encryption: a chaotic ARX block cipher
N Mohananthini, MY Mohamed Parvees… - Journal of Circuits …, 2021 - World Scientific
Nowadays, lightweight cryptography attracts academicians, scientists and researchers to
concentrate on its requisite with the increasing usage of low resource devices. In this paper …
concentrate on its requisite with the increasing usage of low resource devices. In this paper …