Sign Up to like & get
recommendations!
1
Published in 2018 at "Electronics Letters"
DOI: 10.1049/el.2018.1153
Abstract: In the security system, there is a lot of sensitive information, and the leakage of the secret key will cause security failure. In this Letter, combining the fault injection analysis of SM4 (Chinese block cipher…
read more here.
Keywords:
key leakage;
leakage;
fault injection;
block cipher ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2940330
Abstract: In past few years, as security ciphers in the Internet of Things (IoT), the research of lightweight block cipher has attracted tremendous attention in cryptography. The SPN structure has been widely used in the design…
read more here.
Keywords:
spn structure;
lightweight block;
structure;
block cipher ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3183764
Abstract: Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main methods for exploiting the vulnerabilities of physical implementations of block ciphers, currently used in a multitude of applications, such as the Advanced…
read more here.
Keywords:
cipher;
block cipher;
power;
dfa ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3214665
Abstract: PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations. In this study, we use bit-based division property techniques…
read more here.
Keywords:
cryptanalysis;
lightweight block;
block cipher;
pipo ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2022.3152449
Abstract: White-box block cipher (WBC) has been proposed by Chow et al. to prevent the secret key to be extracted from its implementation in an untrusted context. A pivotal technique behind WBC is to convert the…
read more here.
Keywords:
matrix library;
block cipher;
box block;
white box ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Indonesian Journal of Electrical Engineering and Computer Science"
DOI: 10.11591/ijeecs.v10.i2.pp786-791
Abstract: The needing to secure information in restricted environments is very important so that lightweight block cipher algorithm is suitable for these environments. This paper improved DLBCA algorithm by decreasing the cost factor through using the…
read more here.
Keywords:
block cipher;
cipher algorithm;
cost factor;
lightweight block ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Symmetry"
DOI: 10.3390/sym11121485
Abstract: Designing a secure construction has always been a fascinating area for the researchers in the field of symmetric key cryptography. This research aimed to make contributions to the design of secure block cipher in the…
read more here.
Keywords:
permutation;
block cipher;
ideal cipher;
cipher ideal ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Symmetry"
DOI: 10.3390/sym14030604
Abstract: The key schedule algorithm (KSA) is a crucial element of symmetric block ciphers with a direct security impact. Despite its undeniable significance, the KSA is still a less focused area in the design of an…
read more here.
Keywords:
round keys;
block cipher;
random;
round ... See more keywords