Articles with "block ciphers" as a keyword



Photo from academic.microsoft.com

Fast and Energy-Efficient Block Ciphers Implementations in ARM Processors and Mali GPU

Sign Up to like & get
recommendations!
Published in 2020 at "Iete Journal of Research"

DOI: 10.1080/03772063.2020.1725656

Abstract: With the proliferation of the internet of things (IoT) and device-to-device (D2D) communications enabled by the boom of mobile computing technology, secure high-speed communication has now become i... read more here.

Keywords: efficient block; energy efficient; implementations arm; ciphers implementations ... See more keywords
Photo from wikipedia

Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2019.2962101

Abstract: Meet in the middle (MITM) attack is one of the most important and applicable methods for cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is considered. For this purpose,… read more here.

Keywords: block ciphers; cryptanalysis; search algorithm;
Photo from wikipedia

A Deep Learning Approach for Active S-Box Prediction of Lightweight Generalized Feistel Block Ciphers

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3099802

Abstract: One of the main security requirements for symmetric-key block ciphers is resistance against differential cryptanalysis. This is commonly assessed by counting the number of active substitution boxes (S-boxes) using search algorithms or mathematical solvers that… read more here.

Keywords: active box; block; approach; prediction ... See more keywords
Photo from wikipedia

Architectural Supports for Block Ciphers in a RISC CPU Core by Instruction Overloading

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2021.3050515

Abstract: We propose a novel computer architectural concept of instruction overloading to support block ciphers. Instead of adding new instructions, we extend only the execution of some existing instructions. The proposed method allows a central processing… read more here.

Keywords: instruction overloading; block ciphers; core; extension ... See more keywords
Photo by framesforyourheart from unsplash

Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2017.2661811

Abstract: Cryptographic architectures provide different security properties to sensitive usage models. However, unless reliability of architectures is guaranteed, such security properties can be undermined through natural or malicious faults. In this paper, two underlying block ciphers… read more here.

Keywords: block; reliable hardware; authenticated encryption; security ... See more keywords
Photo by scottwebb from unsplash

Trade-off of security and performance of lightweight block ciphers in Industrial Wireless Sensor Networks

Sign Up to like & get
recommendations!
Published in 2018 at "EURASIP Journal on Wireless Communications and Networking"

DOI: 10.1186/s13638-018-1121-6

Abstract: Lightweight block ciphers play an indispensable role for the security in the context of pervasive computing. However, the performance of resource-constrained devices can be affected dynamically by the selection of suitable cryptalgorithms, especially for the… read more here.

Keywords: lightweight block; security; block ciphers; wireless ... See more keywords