A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Customizable sponge-based authenticated encryption using 16-bit S-boxes
2015
MILCOM 2015 - 2015 IEEE Military Communications Conference
Our substitution step uses 16 × 16 AES-like S-boxes which are novel because they are the largest bijective S-boxes to be used by an encryption scheme in the literature and are still efficiently implementable ...
In this paper we introduce a novel authenticated encryption algorithm based on the duplex construction that is targeted for hardware implementation. ...
We present a customizable AE algorithm here that is based on the duplex construction and is built around an iterated permutation that uses 16 × 16 bijective S-boxes. ...
doi:10.1109/milcom.2015.7357416
dblp:conf/milcom/KellyKKLR15
fatcat:7kqpgbqzjjgfbkcwckirsnpdvm
Signcryption schemes with insider security in an ideal permutation model
2019
Journal of Mathematical Cryptology
Due to its elegance and versatility, the sponge structure turns out to be a useful tool for designing new padding schemes such as SpAEP [T. K. Bansal, D. Chang and S. K. ...
Sanadhya, Sponge based CCA2 secure asymmetric encryption for arbitrary length message, Information Security and Privacy – ACISP 2015, Lecture Notes in Comput. ...
The sponge-based padding SpAEP [6] is versatile and has been used in a different security model for asymmetric encryption based on an ideal permutation. ...
doi:10.1515/jmc-2018-0006
fatcat:2gxzb6h6gvf5fnipa47qj7mrda
An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security
2022
Security and Communication Networks
The instruction set extensions (ISE) of lightweight cipher modules can be instantiated in software routines exactly as the instructions of the base architecture. ...
Obtained results show that our proposed concepts not only can achieve good encryption results with high performance and reduced cost but also are secure enough to resist against the most common attacks ...
(ii) SBoxLayer: a 4-bit to 4-bit S-box is used. e action of this box is described by the S-box table presented in [21] . ...
doi:10.1155/2022/9709601
fatcat:jwpnxxezuvg2bjeqvt233pdveq
RunFein: a rapid prototyping framework for Feistel and SPN-based block ciphers
2016
Journal of Cryptographic Engineering
Similarly, the Galois field inversion of the S-box using sub-fields of 4, 2 bits can be used for lower area footprints. ...
, i.e., S b = 4, 8, 16, 32. ...
doi:10.1007/s13389-016-0116-7
fatcat:rwgbiittbnav3m2gqvxlibwgre
Survey on cyberspace security
2015
Science China Information Sciences
In the startup process, a signature verification protocol based on RSA is used for software authentication. ...
Typical protocols based on key chains include Gupta's random key chain scheme [163] and Huang et al.'s key distribution scheme based on the head of the cluster [164] . ...
doi:10.1007/s11432-015-5433-4
fatcat:b2tv6gvovngxhlz7iukug2ehiy
Single-Trace Attacks on Keccak
2020
Transactions on Cryptographic Hardware and Embedded Systems
We evaluate our attack assuming generic software (microcontroller) targets and thus use simulations in the generic noisy Hamming-weight leakage model. ...
Our method is based on soft-analytical side-channel attacks and, thus, combines template matching with message passing in a graphical model of the attacked algorithm. ...
Other examples are the authenticated encryption schemes Keyak [BDP + 16b] and Ketje [BDP + 16a]. ...
doi:10.13154/tches.v2020.i3.243-268
dblp:journals/tches/KannwischerPP20
fatcat:epgrqeeg7vg7hpcqs2igiskme4
A Note on the Post-Quantum Security of (Ring) Signatures
[article]
2021
arXiv
pre-print
Biased Bit-QPRF. We will need a single-bit-output QPRF that output 1 with a customizable
probability ε. Moreover, we need it to be implementable in NC1 . ...
Secure identity-based encryption in the quantum random oracle model. ...
arXiv:2112.06078v1
fatcat:potybhcv7nfqbaw4ek5ggiklmu
Wikipedia in Action: Ontological Knowledge in Text Categorization
2008
2008 IEEE International Conference on Semantic Computing
GOST block cipher has a simple 32-round Feistel structure, which encrypts a 64-bit block using a 256-bit key defined in the standard GOST 28147-89 [27] . ...
For experimentation we have been able to optimize the 3-bit to 3-bit S-box of CTC cipher with respect to different meaningful metrics.
II. ...
doi:10.1109/icsc.2008.53
dblp:conf/semco/JanikK08
fatcat:wzj4ievka5ft3ayxxghzck2vjq
Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM), Summer Semester 2018
[article]
2018
Employed Algorithm We use a SYN based approach as proposed in [16] . ...
For example, the S-Boxes within the block cipher DES can be represented as a table of values used for substitution, where the choice of columns and rows is done by looking at the outer and inner bits of ...
doi:10.2313/net-2018-11-1
fatcat:bnh7d4o7pna4njsnu52zvjcsou