Lightweight cryptographic hash functions: Design trends, comparative study, and future directions
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect
large amounts of data to be connected. Therefore, IoT security has fundamental …
large amounts of data to be connected. Therefore, IoT security has fundamental …
Hardware limitations of lightweight cryptographic designs for IoT in healthcare
K Tsantikidou, N Sklavos - Cryptography, 2022 - mdpi.com
Security is an important aspect of healthcare applications that employ Internet of Things (IoT)
technology. More specifically, providing privacy and ensuring the confidentiality, integrity …
technology. More specifically, providing privacy and ensuring the confidentiality, integrity …
[PDF][PDF] ACE: An authenticated encryption and hash algorithm
5 Design Rationale 26 5.1 Choice of the Mode: sLiSCP Sponge Mode................ 26 5.2 ACE
State Size............................... 27 5.3 ACE Step Function............................. 28 5.4 Nonlinear …
State Size............................... 27 5.3 ACE Step Function............................. 28 5.4 Nonlinear …
The welch-gong stream cipher-evolutionary path
This survey presents the rich history of the Welch-Gong (WG) Stream cipher family. It has
been a long journey that lead the WG stream ciphers to become practical. The evolutionary …
been a long journey that lead the WG stream ciphers to become practical. The evolutionary …
[PDF][PDF] Spix: An authenticated cipher submission to the NIST LWC competition
4 Design Rationale 21 4.1 Choice of the Mode: Monkey Duplex Sponge Mode.......... 21 4.2
Spix State Size.............................. 21 4.3 Nonlinear Layer: Simeck Sbox...................... 22 4.4 …
Spix State Size.............................. 21 4.3 Nonlinear Layer: Simeck Sbox...................... 22 4.4 …
Securing internet-of-things
G Gong - International Symposium on Foundations and Practice …, 2018 - Springer
In this survey, we first present some vulnerabilities and attacks on IoT systems, and
classification of IoT devices, we then show the evolution of the development of lightweight …
classification of IoT devices, we then show the evolution of the development of lightweight …
Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers
X Wang, B Wu, L Hou, D Lin - Cybersecurity, 2021 - Springer
In this paper, we greatly increase the number of impossible differentials for SIMON and
SIMECK by eliminating the 1-bit constraint in input/output difference, which is the …
SIMECK by eliminating the 1-bit constraint in input/output difference, which is the …
High-Security Hardware Module with PUF and Hybrid Cryptography for Data Security
This research highlights the rapid development of technology in the industry, particularly
Industry 4.0, supported by fundamental technologies such as the Internet of Things (IoT) …
Industry 4.0, supported by fundamental technologies such as the Internet of Things (IoT) …
[PDF][PDF] SIMON 算法相关密钥不可能差分特征搜索
王旭姿, 吴保峰, 侯林, 林东岱 - Journal of Cryptologic Research, 2021 - jcr.cacrnet.org.cn
本文通过求解SIMON 算法密钥扩展算法的混合整数线性规划(mixed-integer linear
programming, MILP) 模型, 首次给出其相关密钥不可能差分分析结果. 对分组密码算法的不可能 …
programming, MILP) 模型, 首次给出其相关密钥不可能差分分析结果. 对分组密码算法的不可能 …
Design and cryptanalysis of lightweight symmetric key primitives
R Rohit - 2020 - uwspace.uwaterloo.ca
The need for lightweight cryptographic primitives to replace the traditional standardized
primitives such as AES, SHA-2 and SHA-3, which are unrealistic in constrained …
primitives such as AES, SHA-2 and SHA-3, which are unrealistic in constrained …