Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

Machine learning-assisted differential distinguishers for lightweight ciphers

A Baksi, A Baksi - Classical and Physical Security of Symmetric Key …, 2022 - Springer
At CRYPTO'19, Gohr first introduces the deep learning-based cryptanalysis on round-
reduced SPECK. Using a deep residual network, Gohr trains several neural network-based …

Lightweight cryptographic hash functions: Design trends, comparative study, and future directions

S Windarta, S Suryadi, K Ramli, B Pranggono… - Ieee …, 2022 - ieeexplore.ieee.org
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect
large amounts of data to be connected. Therefore, IoT security has fundamental …

Quantum implementation and resource estimates for rectangle and knot

A Baksi, K Jang, G Song, H Seo, Z Xiang - Quantum Information …, 2021 - Springer
With the advancement of the quantum computing technologies, a large body of research
work is dedicated to revisit the security claims for ciphers being used. An adversary with …

Differential cryptanalysis in the fixed-key model

T Beyne, V Rijmen - Annual International Cryptology Conference, 2022 - Springer
A systematic approach to the fixed-key analysis of differential probabilities is proposed. It is
based on the propagation of 'quasidifferential trails', which keep track of probabilistic linear …

Tight preimage resistance of the sponge construction

C Lefevre, B Mennink - Annual International Cryptology Conference, 2022 - Springer
The cryptographic sponge is a popular method for hash function design. The construction is
in the ideal permutation model proven to be indifferentiable from a random oracle up to the …

A Lightweight and Confidential Communication Scheme for on-Vehicle ECUs

X Hu, G Huang, Y Ning, L Wang, J Suo, K Ota… - IEEE …, 2024 - ieeexplore.ieee.org
The electronic control unit (ECU) broadcasts and receives data through the on-vehicle bus,
enabling the management of the vehicle's operations and associated functions …

Construction of Robust Lightweight S-Boxes Using Enhanced Logistic and Enhanced Sine Maps

PP Duong, HM Nguyen, BA Dao… - IEEE …, 2024 - ieeexplore.ieee.org
Substitution boxes (S-Boxes) are essential elements of modern block ciphers, serving as
non-linear characteristics that enhance the resistance of these ciphers against cryptanalysis …

Neural differential distinguishers for GIFT-128 and ASCON

D Shen, Y Song, Y Lu, S Long, S Tian - Journal of Information Security and …, 2024 - Elsevier
In CRYPTO 2019, Gohr first introduced a neural differential distinguisher for round-reduced
SPECK32/64 to distinguish ciphertext pairs with a specific input difference from random …

On the relationships between different methods for degree evaluation

S Chen, Z Xiang, X Zeng, S Zhang - IACR Transactions on Symmetric …, 2021 - tosc.iacr.org
In this paper, we compare several non-tight degree evaluation methods ie, Boura and
Canteaut's formula, Carlet's formula as well as Liu's numeric mapping and division property …