Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
Comparative performance analysis of lightweight cryptography algorithms for IoT sensor nodes
The Internet of Things (IoT) has become an integral part of future solutions, ranging from
industrial to everyday human life applications. Adding a new level of intelligence to objects …
industrial to everyday human life applications. Adding a new level of intelligence to objects …
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
S Chen, Y Fan, L Sun, Y Fu, H Zhou, Y Li… - Designs, Codes and …, 2022 - Springer
We revisit designing AND-RX block ciphers, that is, the designs assembled with the most
fundamental binary operations—AND, Rotation and XOR operations and do not rely on …
fundamental binary operations—AND, Rotation and XOR operations and do not rely on …
Key guessing strategies for linear key-schedule algorithms in rectangle attacks
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we
find the right quartets which may suggest key candidates have to satisfy some nonlinear …
find the right quartets which may suggest key candidates have to satisfy some nonlinear …
Improved rectangle attacks on SKINNY and CRAFT
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard
the target cipher E as a composition of two sub-ciphers, ie, E= E1∘ E0, to construct a …
the target cipher E as a composition of two sub-ciphers, ie, E= E1∘ E0, to construct a …
An authentication protocol for next generation of constrained Iot systems
With the exponential growth of connected Internet of Things (IoT) devices around the world,
security protection and privacy preservation have risen to the forefront of design and …
security protection and privacy preservation have risen to the forefront of design and …
Automated search oriented to key recovery on ciphers with linear key schedule: applications to boomerangs in SKINNY and ForkSkinny
L Qin, X Dong, X Wang, K Jia, Y Liu - IACR Transactions on Symmetric …, 2021 - tosc.iacr.org
Automatic modelling to search distinguishers with high probability covering as many rounds
as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis …
as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis …
1, 2, 3, fork: Counter mode variants based on a generalized forkcipher
A multi-forkcipher (MFC) is a generalization of the forkcipher (FC) primitive introduced by
Andreeva et al. at ASIACRYPT'19. An MFC is a tweakable cipher that computes $ s $ output …
Andreeva et al. at ASIACRYPT'19. An MFC is a tweakable cipher that computes $ s $ output …
Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation
IoT devices collect privacy-sensitive data, eg, in smart grids or in medical devices, and send
this data to cloud servers for further processing. In order to ensure confidentiality as well as …
this data to cloud servers for further processing. In order to ensure confidentiality as well as …
Energy analysis of lightweight AEAD circuits
The selection criteria for NIST's Lightweight Crypto Standardization (LWC) have been slowly
shifting towards the lightweight efficiency of designs, given that a large number of …
shifting towards the lightweight efficiency of designs, given that a large number of …