State of the art in lightweight symmetric cryptography

A Biryukov, L Perrin - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Lightweight cryptography has been one of the" hot topics" in symmetric cryptography in the
recent years. A huge number of lightweight algorithms have been published, standardized …

Hashing techniques: A survey and taxonomy

L Chi, X Zhu - ACM Computing Surveys (Csur), 2017 - dl.acm.org
With the rapid development of information storage and networking technologies, quintillion
bytes of data are generated every day from social networks, business transactions, sensors …

[PDF][PDF] A decentralized blockchain with high throughput and fast confirmation

C Li, P Li, D Zhou, Z Yang, M Wu, G Yang… - 2020 {USENIX} Annual …, 2020 - usenix.org
This paper presents Conflux, a scalable and decentralized blockchain system with high
throughput and fast confirmation. Conflux operates with a novel consensus protocol which …

SPHINCS: practical stateless hash-based signatures

DJ Bernstein, D Hopwood, A Hülsing, T Lange… - … conference on the …, 2015 - Springer
This paper introduces a high-security post-quantum stateless hash-based signature scheme
that signs hundreds of messages per second on a modern 4-core 3.5 GHz Intel CPU …

CSI: Rowhammer–Cryptographic security and integrity against rowhammer

J Juffinger, L Lamster, A Kogler… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
In this paper, we present CSI: Rowhammer, a principled hardware-software co-design
Rowhammer mitigation with cryptographic security and integrity guarantees, that does not …

Chaskey: an efficient MAC algorithm for 32-bit microcontrollers

N Mouha, B Mennink, A Van Herrewege… - Selected Areas in …, 2014 - Springer
We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …

The complete guide to scion

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

Machine learning-assisted differential distinguishers for lightweight ciphers

A Baksi, A Baksi - Classical and Physical Security of Symmetric Key …, 2022 - Springer
At CRYPTO'19, Gohr first introduces the deep learning-based cryptanalysis on round-
reduced SPECK. Using a deep residual network, Gohr trains several neural network-based …

Pacmem: Enforcing spatial and temporal memory safety via arm pointer authentication

Y Li, W Tan, Z Lv, S Yang, M Payer, Y Liu… - Proceedings of the 2022 …, 2022 - dl.acm.org
Memory safety is a key security property that stops memory corruption vulnerabilities.
Different types of memory safety enforcement solutions have been proposed and adopted by …

A survey of network-on-chip security attacks and countermeasures

S Charles, P Mishra - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
With the advances of chip manufacturing technologies, computer architects have been able
to integrate an increasing number of processors and other heterogeneous components on …