Sign Up to like & get
recommendations!
1
Published in 2020 at "Iete Journal of Research"
DOI: 10.1080/03772063.2020.1725656
Abstract: With the proliferation of the internet of things (IoT) and device-to-device (D2D) communications enabled by the boom of mobile computing technology, secure high-speed communication has now become i...
read more here.
Keywords:
efficient block;
energy efficient;
implementations arm;
ciphers implementations ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2019.2962101
Abstract: Meet in the middle (MITM) attack is one of the most important and applicable methods for cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is considered. For this purpose,…
read more here.
Keywords:
block ciphers;
cryptanalysis;
search algorithm;
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3099802
Abstract: One of the main security requirements for symmetric-key block ciphers is resistance against differential cryptanalysis. This is commonly assessed by counting the number of active substitution boxes (S-boxes) using search algorithms or mathematical solvers that…
read more here.
Keywords:
active box;
block;
approach;
prediction ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2021.3050515
Abstract: We propose a novel computer architectural concept of instruction overloading to support block ciphers. Instead of adding new instructions, we extend only the execution of some existing instructions. The proposed method allows a central processing…
read more here.
Keywords:
instruction overloading;
block ciphers;
core;
extension ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"
DOI: 10.1109/tcad.2017.2661811
Abstract: Cryptographic architectures provide different security properties to sensitive usage models. However, unless reliability of architectures is guaranteed, such security properties can be undermined through natural or malicious faults. In this paper, two underlying block ciphers…
read more here.
Keywords:
block;
reliable hardware;
authenticated encryption;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "EURASIP Journal on Wireless Communications and Networking"
DOI: 10.1186/s13638-018-1121-6
Abstract: Lightweight block ciphers play an indispensable role for the security in the context of pervasive computing. However, the performance of resource-constrained devices can be affected dynamically by the selection of suitable cryptalgorithms, especially for the…
read more here.
Keywords:
lightweight block;
security;
block ciphers;
wireless ... See more keywords