Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey on the implementations, attacks, and countermeasures of the current NIST lightweight cryptography standard
This survey is the first work on the current standard for lightweight cryptography,
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …
A review of the nist lightweight cryptography finalists and their fault analyses
The security of resource-constrained devices is critical in the IoT field, given that everything
is interconnected. Therefore, the National Institute of Standards and Technology (NIST) …
is interconnected. Therefore, the National Institute of Standards and Technology (NIST) …
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our
information infrastructure. In this paper, we provide the specification of Ascon-128 and …
information infrastructure. In this paper, we provide the specification of Ascon-128 and …
[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …
standardization process to select one or more Authenticated Encryption with Associated …
DLCT: a new tool for differential-linear cryptanalysis
Differential cryptanalysis and linear cryptanalysis are the two best-known techniques for
cryptanalysis of block ciphers. In 1994, Langford and Hellman introduced the differential …
cryptanalysis of block ciphers. In 1994, Langford and Hellman introduced the differential …
Conditional cube attack on reduced-round Keccak sponge function
The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest.
Recently, some attention has been paid to the analysis of keyed modes of Keccak sponge …
Recently, some attention has been paid to the analysis of keyed modes of Keccak sponge …
Differential-linear cryptanalysis revisited
The two main classes of statistical cryptanalysis are the linear and differential attacks. They
have many variants and enhancements such as the multidimensional linear attacks and the …
have many variants and enhancements such as the multidimensional linear attacks and the …
Differential-linear cryptanalysis from an algebraic perspective
M Liu, X Lu, D Lin - Annual International Cryptology Conference, 2021 - Springer
The differential-linear cryptanalysis is an important cryptanalytic tool in cryptography, and
has been extensively researched since its discovery by Langford and Hellman in 1994 …
has been extensively researched since its discovery by Langford and Hellman in 1994 …
Conditional cube attack on round-reduced ASCON
This paper evaluates the secure level of authenticated encryption Ascon against cube-like
method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round …
method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round …
Neural differential distinguishers for GIFT-128 and ASCON
D Shen, Y Song, Y Lu, S Long, S Tian - Journal of Information Security and …, 2024 - Elsevier
In CRYPTO 2019, Gohr first introduced a neural differential distinguisher for round-reduced
SPECK32/64 to distinguish ciphertext pairs with a specific input difference from random …
SPECK32/64 to distinguish ciphertext pairs with a specific input difference from random …