[BOOK][B] Status report on the final round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …

An Automated Fault Attack Framework for Block Ciphers Through Property Mining and Verification

X Wang, W Hu, S Tang, X Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Fault attacks are effective side-channel attack methods for cryptanalysis. However, existing
fault attack methods involve manual derivation of complex fault models or computation …

HCS: A Hybrid Data Security Enhancing Model Based on Cryptography Algorithms

A Singhal, J Madan, S Madan - Advances in Information Communication …, 2023 - Springer
With the advancement in technology, plenty of data is being shared between users using
various mediums. And with this excessive data transmission, it needs to be supervised that …

Fault Analysis on AES and SM4 Through Automatic Property Extraction and Checking

X Wang, X Wang, C Yuan, W Hu - 2023 Asian Hardware …, 2023 - ieeexplore.ieee.org
Fault analysis is an effective cryptanalysis method for both unprotected and masked
cryptographic implementations. However, it usually involves complex mathematical …

Review of the Literature on Using Machine and Deep Learning Techniques to Improve IoT Security

A Khang, Y Singh, D Barak - Revolutionizing Automated Waste …, 2024 - igi-global.com
The current work discusses the concept of the internet of things (IoT) and its implications on
various domains, highlighting the challenges and security concerns associated with its …

Finding Security Gaps and Vulnerabilities in IoT Devices

K Singh, M Yadav, Y Singh, D Barak - … Automated Waste Treatment …, 2024 - igi-global.com
The internet of things (IoT) and wireless sensor networks (WSNs) have become important
innovations, offering unparalleled connectivity and pervasive data access for a variety of …

Analysis of Resource Utilization in Lightweight Cryptographic Algorithms

C Rahul, N Kousarr, TA Yadav, P Keerthi… - 2024 International …, 2024 - ieeexplore.ieee.org
In the dynamic landscape of the Internet of Things (IoT), the demand for efficient lightweight
cryptographic (LWC) algorithms transcends traditional security considerations. This research …

Design and Implementation of Power-Efficient Cryptography Scheme Using a Novel Multiplication Technique

B Srikanth, JVR Ravindra, P Ramakrishna… - Wireless Personal …, 2023 - Springer
The threat application and data hacking systems rule today's digital world. Hence, securing
digital information is the most needed to keep personal detail confidential. Several …

Designing Novel Hardware Security Primitives for Smart Computing Devices

A Degada - 2021 - uknowledge.uky.edu
Smart computing devices are miniaturized electronics devices that can sense their
surroundings, communicate, and share information autonomously with other devices to work …

Fault Injection Analysis of Embedded Cryptography: Attacks and Solutions

M Gruber - 2024 - mediatum.ub.tum.de
This thesis investigates the applicability of Fault Injection Analysis (FIA) to candidates of the
CAESAR and LWC competition, by the application of state-of-the-art fault attacks …