Articles with "block cipher" as a keyword



Photo by hakannural from unsplash

Key-leakage hardware Trojan with super concealment based on the fault injection for block cipher of SM4

Sign Up to like & get
recommendations!
Published in 2018 at "Electronics Letters"

DOI: 10.1049/el.2018.1153

Abstract: In the security system, there is a lot of sensitive information, and the leakage of the secret key will cause security failure. In this Letter, combining the fault injection analysis of SM4 (Chinese block cipher… read more here.

Keywords: key leakage; leakage; fault injection; block cipher ... See more keywords
Photo by mybbor from unsplash

Loong: A Family of Involutional Lightweight Block Cipher Based on SPN Structure

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2940330

Abstract: In past few years, as security ciphers in the Internet of Things (IoT), the research of lightweight block cipher has attracted tremendous attention in cryptography. The SPN structure has been widely used in the design… read more here.

Keywords: spn structure; lightweight block; structure; block cipher ... See more keywords
Photo from wikipedia

Design and evaluation of countermeasures against fault injection attacks and power side-channel leakage exploration for AES block cipher

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3183764

Abstract: Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the vulnerabilities of physical implementations of block ciphers, currently used in a multitude of applications, such as the Advanced… read more here.

Keywords: cipher; block cipher; power; dfa ... See more keywords
Photo by lgnwvr from unsplash

Integral Cryptanalysis of Lightweight Block Cipher PIPO

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3214665

Abstract: PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations. In this study, we use bit-based division property techniques… read more here.

Keywords: cryptanalysis; lightweight block; block cipher; pipo ... See more keywords
Photo by itfeelslikefilm from unsplash

WBMatrix: An Optimized Matrix Library for White-Box Block Cipher Implementations

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2022.3152449

Abstract: White-box block cipher (WBC) has been proposed by Chow et al. to prevent the secret key to be extracted from its implementation in an untrusted context. A pivotal technique behind WBC is to convert the… read more here.

Keywords: matrix library; block cipher; box block; white box ... See more keywords
Photo by lgnwvr from unsplash

Improving the Cost Factor of DLBCA Lightweight Block Cipher Algorithm

Sign Up to like & get
recommendations!
Published in 2018 at "Indonesian Journal of Electrical Engineering and Computer Science"

DOI: 10.11591/ijeecs.v10.i2.pp786-791

Abstract: The needing to secure information in restricted environments is very important so that lightweight block cipher algorithm is suitable for these environments. This paper improved DLBCA algorithm by decreasing the cost factor through using the… read more here.

Keywords: block cipher; cipher algorithm; cost factor; lightweight block ... See more keywords
Photo by lgnwvr from unsplash

Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation

Sign Up to like & get
recommendations!
Published in 2019 at "Symmetry"

DOI: 10.3390/sym11121485

Abstract: Designing a secure construction has always been a fascinating area for the researchers in the field of symmetric key cryptography. This research aimed to make contributions to the design of secure block cipher in the… read more here.

Keywords: permutation; block cipher; ideal cipher; cipher ideal ... See more keywords
Photo by efekurnaz from unsplash

An Enhanced Key Schedule Algorithm of PRESENT-128 Block Cipher for Random and Non-Random Secret Keys

Sign Up to like & get
recommendations!
Published in 2022 at "Symmetry"

DOI: 10.3390/sym14030604

Abstract: The key schedule algorithm (KSA) is a crucial element of symmetric block ciphers with a direct security impact. Despite its undeniable significance, the KSA is still a less focused area in the design of an… read more here.

Keywords: round keys; block cipher; random; round ... See more keywords