Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
Machine learning-assisted differential distinguishers for lightweight ciphers
A Baksi, A Baksi - Classical and Physical Security of Symmetric Key …, 2022 - Springer
At CRYPTO'19, Gohr first introduces the deep learning-based cryptanalysis on round-
reduced SPECK. Using a deep residual network, Gohr trains several neural network-based …
reduced SPECK. Using a deep residual network, Gohr trains several neural network-based …
Lightweight cryptographic hash functions: Design trends, comparative study, and future directions
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect
large amounts of data to be connected. Therefore, IoT security has fundamental …
large amounts of data to be connected. Therefore, IoT security has fundamental …
Quantum implementation and resource estimates for rectangle and knot
With the advancement of the quantum computing technologies, a large body of research
work is dedicated to revisit the security claims for ciphers being used. An adversary with …
work is dedicated to revisit the security claims for ciphers being used. An adversary with …
Differential cryptanalysis in the fixed-key model
A systematic approach to the fixed-key analysis of differential probabilities is proposed. It is
based on the propagation of 'quasidifferential trails', which keep track of probabilistic linear …
based on the propagation of 'quasidifferential trails', which keep track of probabilistic linear …
Tight preimage resistance of the sponge construction
The cryptographic sponge is a popular method for hash function design. The construction is
in the ideal permutation model proven to be indifferentiable from a random oracle up to the …
in the ideal permutation model proven to be indifferentiable from a random oracle up to the …
A Lightweight and Confidential Communication Scheme for on-Vehicle ECUs
X Hu, G Huang, Y Ning, L Wang, J Suo, K Ota… - IEEE …, 2024 - ieeexplore.ieee.org
The electronic control unit (ECU) broadcasts and receives data through the on-vehicle bus,
enabling the management of the vehicle's operations and associated functions …
enabling the management of the vehicle's operations and associated functions …
Construction of Robust Lightweight S-Boxes Using Enhanced Logistic and Enhanced Sine Maps
Substitution boxes (S-Boxes) are essential elements of modern block ciphers, serving as
non-linear characteristics that enhance the resistance of these ciphers against cryptanalysis …
non-linear characteristics that enhance the resistance of these ciphers against cryptanalysis …
Neural differential distinguishers for GIFT-128 and ASCON
D Shen, Y Song, Y Lu, S Long, S Tian - Journal of Information Security and …, 2024 - Elsevier
In CRYPTO 2019, Gohr first introduced a neural differential distinguisher for round-reduced
SPECK32/64 to distinguish ciphertext pairs with a specific input difference from random …
SPECK32/64 to distinguish ciphertext pairs with a specific input difference from random …
On the relationships between different methods for degree evaluation
In this paper, we compare several non-tight degree evaluation methods ie, Boura and
Canteaut's formula, Carlet's formula as well as Liu's numeric mapping and division property …
Canteaut's formula, Carlet's formula as well as Liu's numeric mapping and division property …