Filters








9 Hits in 5.2 sec

Customizable sponge-based authenticated encryption using 16-bit S-boxes

Matthew Kelly, Alan Kaminsky, Michael Kurdziel, Marcin Lukowiak, Stanislaw Radziszowski
2015 MILCOM 2015 - 2015 IEEE Military Communications Conference  
Our substitution step uses 16 × 16 AES-like S-boxes which are novel because they are the largest bijective S-boxes to be used by an encryption scheme in the literature and are still efficiently implementable  ...  In this paper we introduce a novel authenticated encryption algorithm based on the duplex construction that is targeted for hardware implementation.  ...  We present a customizable AE algorithm here that is based on the duplex construction and is built around an iterated permutation that uses 16 × 16 bijective S-boxes.  ... 
doi:10.1109/milcom.2015.7357416 dblp:conf/milcom/KellyKKLR15 fatcat:7kqpgbqzjjgfbkcwckirsnpdvm

Signcryption schemes with insider security in an ideal permutation model

Tarun Kumar Bansal, Xavier Boyen, Josef Pieprzyk
2019 Journal of Mathematical Cryptology  
Due to its elegance and versatility, the sponge structure turns out to be a useful tool for designing new padding schemes such as SpAEP [T. K. Bansal, D. Chang and S. K.  ...  Sanadhya, Sponge based CCA2 secure asymmetric encryption for arbitrary length message, Information Security and Privacy – ACISP 2015, Lecture Notes in Comput.  ...  The sponge-based padding SpAEP [6] is versatile and has been used in a different security model for asymmetric encryption based on an ideal permutation.  ... 
doi:10.1515/jmc-2018-0006 fatcat:2gxzb6h6gvf5fnipa47qj7mrda

An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security

Wajih El Hadj Youssef, Ali Abdelli, Fethi Dridi, Rim Brahim, Mohsen Machhout, Ricardo Chaves
2022 Security and Communication Networks  
The instruction set extensions (ISE) of lightweight cipher modules can be instantiated in software routines exactly as the instructions of the base architecture.  ...  Obtained results show that our proposed concepts not only can achieve good encryption results with high performance and reduced cost but also are secure enough to resist against the most common attacks  ...  (ii) SBoxLayer: a 4-bit to 4-bit S-box is used. e action of this box is described by the S-box table presented in [21] .  ... 
doi:10.1155/2022/9709601 fatcat:jwpnxxezuvg2bjeqvt233pdveq

RunFein: a rapid prototyping framework for Feistel and SPN-based block ciphers

Ayesha Khalid, Muhammad Hassan, Goutam Paul, Anupam Chattopadhyay
2016 Journal of Cryptographic Engineering  
Similarly, the Galois field inversion of the S-box using sub-fields of 4, 2 bits can be used for lower area footprints.  ...  , i.e., S b = 4, 8, 16, 32.  ... 
doi:10.1007/s13389-016-0116-7 fatcat:rwgbiittbnav3m2gqvxlibwgre

Survey on cyberspace security

HuanGuo Zhang, WenBao Han, XueJia Lai, DongDai Lin, JianFeng Ma, JianHua Li
2015 Science China Information Sciences  
In the startup process, a signature verification protocol based on RSA is used for software authentication.  ...  Typical protocols based on key chains include Gupta's random key chain scheme [163] and Huang et al.'s key distribution scheme based on the head of the cluster [164] .  ... 
doi:10.1007/s11432-015-5433-4 fatcat:b2tv6gvovngxhlz7iukug2ehiy

Single-Trace Attacks on Keccak

Matthias J. Kannwischer, Peter Pessl, Robert Primas
2020 Transactions on Cryptographic Hardware and Embedded Systems  
We evaluate our attack assuming generic software (microcontroller) targets and thus use simulations in the generic noisy Hamming-weight leakage model.  ...  Our method is based on soft-analytical side-channel attacks and, thus, combines template matching with message passing in a graphical model of the attacked algorithm.  ...  Other examples are the authenticated encryption schemes Keyak [BDP + 16b] and Ketje [BDP + 16a].  ... 
doi:10.13154/tches.v2020.i3.243-268 dblp:journals/tches/KannwischerPP20 fatcat:epgrqeeg7vg7hpcqs2igiskme4

A Note on the Post-Quantum Security of (Ring) Signatures [article]

Rohit Chatterjee, Kai-Min Chung, Xiao Liang, Giulio Malavolta
2021 arXiv   pre-print
Biased Bit-QPRF. We will need a single-bit-output QPRF that output 1 with a customizable probability ε. Moreover, we need it to be implementable in NC1 .  ...  Secure identity-based encryption in the quantum random oracle model.  ... 
arXiv:2112.06078v1 fatcat:potybhcv7nfqbaw4ek5ggiklmu

Wikipedia in Action: Ontological Knowledge in Text Categorization

Maciej Janik, Krys J. Kochut
2008 2008 IEEE International Conference on Semantic Computing  
GOST block cipher has a simple 32-round Feistel structure, which encrypts a 64-bit block using a 256-bit key defined in the standard GOST 28147-89 [27] .  ...  For experimentation we have been able to optimize the 3-bit to 3-bit S-box of CTC cipher with respect to different meaningful metrics. II.  ... 
doi:10.1109/icsc.2008.53 dblp:conf/semco/JanikK08 fatcat:wzj4ievka5ft3ayxxghzck2vjq

Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM), Summer Semester 2018 [article]

Georg Carle, Daniel Raumer, Stephan Günther, Benedikt Jaeger, Chair Of Network Architectures
2018
Employed Algorithm We use a SYN based approach as proposed in [16] .  ...  For example, the S-Boxes within the block cipher DES can be represented as a table of values used for substitution, where the choice of columns and rows is done by looking at the outer and inner bits of  ... 
doi:10.2313/net-2018-11-1 fatcat:bnh7d4o7pna4njsnu52zvjcsou