[BOOK][B] Status report on the final round of the NIST lightweight cryptography standardization process
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …
standardization process to select one or more schemes that provide Authenticated …
An Automated Fault Attack Framework for Block Ciphers Through Property Mining and Verification
X Wang, W Hu, S Tang, X Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Fault attacks are effective side-channel attack methods for cryptanalysis. However, existing
fault attack methods involve manual derivation of complex fault models or computation …
fault attack methods involve manual derivation of complex fault models or computation …
HCS: A Hybrid Data Security Enhancing Model Based on Cryptography Algorithms
A Singhal, J Madan, S Madan - Advances in Information Communication …, 2023 - Springer
With the advancement in technology, plenty of data is being shared between users using
various mediums. And with this excessive data transmission, it needs to be supervised that …
various mediums. And with this excessive data transmission, it needs to be supervised that …
Fault Analysis on AES and SM4 Through Automatic Property Extraction and Checking
X Wang, X Wang, C Yuan, W Hu - 2023 Asian Hardware …, 2023 - ieeexplore.ieee.org
Fault analysis is an effective cryptanalysis method for both unprotected and masked
cryptographic implementations. However, it usually involves complex mathematical …
cryptographic implementations. However, it usually involves complex mathematical …
Review of the Literature on Using Machine and Deep Learning Techniques to Improve IoT Security
The current work discusses the concept of the internet of things (IoT) and its implications on
various domains, highlighting the challenges and security concerns associated with its …
various domains, highlighting the challenges and security concerns associated with its …
Finding Security Gaps and Vulnerabilities in IoT Devices
The internet of things (IoT) and wireless sensor networks (WSNs) have become important
innovations, offering unparalleled connectivity and pervasive data access for a variety of …
innovations, offering unparalleled connectivity and pervasive data access for a variety of …
Analysis of Resource Utilization in Lightweight Cryptographic Algorithms
C Rahul, N Kousarr, TA Yadav, P Keerthi… - 2024 International …, 2024 - ieeexplore.ieee.org
In the dynamic landscape of the Internet of Things (IoT), the demand for efficient lightweight
cryptographic (LWC) algorithms transcends traditional security considerations. This research …
cryptographic (LWC) algorithms transcends traditional security considerations. This research …
Design and Implementation of Power-Efficient Cryptography Scheme Using a Novel Multiplication Technique
The threat application and data hacking systems rule today's digital world. Hence, securing
digital information is the most needed to keep personal detail confidential. Several …
digital information is the most needed to keep personal detail confidential. Several …
Designing Novel Hardware Security Primitives for Smart Computing Devices
A Degada - 2021 - uknowledge.uky.edu
Smart computing devices are miniaturized electronics devices that can sense their
surroundings, communicate, and share information autonomously with other devices to work …
surroundings, communicate, and share information autonomously with other devices to work …
Fault Injection Analysis of Embedded Cryptography: Attacks and Solutions
M Gruber - 2024 - mediatum.ub.tum.de
This thesis investigates the applicability of Fault Injection Analysis (FIA) to candidates of the
CAESAR and LWC competition, by the application of state-of-the-art fault attacks …
CAESAR and LWC competition, by the application of state-of-the-art fault attacks …