نتایج جستجو برای: lightweight cryptographic primitives

تعداد نتایج: 49629  

Journal: :ICST Trans. Security Safety 2013
Xinxin Fan Kalikinkar Mandal Guang Gong

Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we present a lightweight stream cipher WG-8, which is tailored from the well-known Welch-Gong (WG) stream cipher family, for resource-constrained devices. WG-8 inherits the good randomness and cryptographic properties of the WG stream ...

Journal: :JCS 2014
T. Blesslin Sheeba P. Rangarajan

The side-channel attacks are one of the effortless and commanding attacks against cryptographic implementation and their intention vary from protocols, modules, primitives and system. As a result of this attack, a serious threat to the security of cryptographic module was encountered. In effect, realization of the cryptographic algorithm has to take some countermeasure to resist against this ty...

Journal: :Journal of Mathematical Cryptology 2020

2012
Master-Thesis von Michael Walter Michael Walter Johannes A. Buchmann Stanislav Bulygin Johannes Buchmann

In this work we analyze two lightweight cryptographic primitives, the hash function SPONGENT and the block cipher EPCBC, using algebraic methods. Regarding SPONGENT, we are able to improve on previously known results by finding two semi-free-start collisions for round-reduced SPONGENT-88 with 6 rounds, and prove that no semifree-start collisions exist for SPONGENT-128 with 6 rounds. For EPCBC w...

Journal: :IACR Cryptology ePrint Archive 2017
Riham AlTawy Raghvendra Rohit Morgan He Kalikinkar Mandal Gangqiang Yang Guang Gong

In this paper, we propose a family of lightweight cryptographic permutations called sLiSCP, with the sole aim to provide a realistic minimal design that suits a variety of lightweight device applications. More precisely, we argue that for such devices the chip area dedicated for security purposes should, not only be consumed by an encryption or hashing algorithm, but also provide as many crypto...

Journal: :IEEE Access 2022

The emergence of the Internet Things (IoT) has enabled billions devices that collect large amounts data to be connected. Therefore, IoT security fundamental requirements. One critical aspect is integrity. Cryptographic hash functions are cryptographic primitives provide integrity services. However, due limitations devices, existing not suitable for all environments. As a result, researchers hav...

2015
Daniel Dinu Alex Biryukov Johann Großschädl Dmitry Khovratovich Yann Le Corre Léo Perrin

In this paper we introduce FELICS, a free and open-source benchmarking framework designed for fair and consistent evaluation of software implementations of lightweight cryptographic primitives for embedded devices. The framework is very flexible thanks to its modular structure, which allows for an easy integration of new metrics, target devices and evaluation scenarios. It consists of two modul...

2012
Thierry P. Berger Joffrey D'Hayer Kevin Marquet Marine Minier Gaël Thomas

Since the beginning of the SHA3 competition, the cryptographic community has seen the emergence of a new kind of primitives: the lightweight cryptographic hash functions. At the time writing this article, two representatives of this category have been published: Quark [7] and PHOTON [18] designed to match RFID constraints. In this paper, we propose a third representative of this category which ...

2015
Martin M. Lauridsen Christian Rechberger

The application of the concept of linear cryptanalysis to the domain of key-less primitives is largely an open problem. In this paper we, for the first time, propose a model in which its application is meaningful for distinguishing block ciphers. Combining our model with ideas from message modification and reboundlike approaches, we initiate a study of cryptographic primitives with respect to t...

Journal: :IACR Cryptology ePrint Archive 2015
Nicky Mouha

For constrained devices, standard cryptographic algorithms can be too big, too slow or too energy-consuming. The area of lightweight cryptography studies new algorithms to overcome these problems. In this paper, we will focus on symmetric-key encryption, authentication and hashing. Instead of providing a full overview of this area of research, we will highlight three interesting topics. Firstly...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید