Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications
Internet of things (IoT) provides several applications such as intelligent urban transportation,
smart factory, and smart health. In such systems, the transmitted data are important and must …
smart factory, and smart health. In such systems, the transmitted data are important and must …
The qarmav2 family of tweakable block ciphers
We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA
(from FSE 2017) to improve its security bounds and allow for longer tweaks, while kee** …
(from FSE 2017) to improve its security bounds and allow for longer tweaks, while kee** …
Skinny-aead and skinny-hash
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of
hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family …
hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family …
Lightweight authenticated encryption mode suitable for threshold implementation
This paper proposes tweakable block cipher (TBC) based modes PFB\_Plus PFB _ Plus and
PFB ω PFB ω that are efficient in threshold implementations (TI). Let t be an algebraic …
PFB ω PFB ω that are efficient in threshold implementations (TI). Let t be an algebraic …
An automated accurate sound-based amateur drone detection method based on skinny pattern
Nowadays, the popularity of amateur drones (ADr) has increased marginally, and many
research areas, such as machine learning, security systems, and the military industry, have …
research areas, such as machine learning, security systems, and the military industry, have …
On the construction of near-MDS matrices
The optimal branch number of MDS matrices makes them a preferred choice for designing
diffusion layers in many block ciphers and hash functions. However, in lightweight …
diffusion layers in many block ciphers and hash functions. However, in lightweight …
Efficient methods to search for best differential characteristics on SKINNY
Evaluating resistance of ciphers against differential cryptanalysis is essential to define the
number of rounds of new designs and to mount attacks derived from differential …
number of rounds of new designs and to mount attacks derived from differential …
Resource-constrained encryption: Extending ibex with a qarma hardware accelerator
The increasing prevalence of IoT devices calls for the need for strong, but efficient
cryptography. In this paper we present two instruction set extensions for the lightweight …
cryptography. In this paper we present two instruction set extensions for the lightweight …
SKINNY with scalpel-comparing tools for differential analysis
Evaluating resistance of ciphers against differential cryptanalysis is essential to define the
number of rounds of new designs and to mount attacks derived from differential …
number of rounds of new designs and to mount attacks derived from differential …
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256
Designing symmetric ciphers for particular applications becomes a hot topic. At
EUROCRYPT 2020, Naito, Sasaki and Sugawara invented the threshold implementation …
EUROCRYPT 2020, Naito, Sasaki and Sugawara invented the threshold implementation …