-
1
Cryptanalysis of Loiss Stream Cipher-Revisited
Published 2014-01-01“…Loiss is a novel byte-oriented stream cipher proposed in 2011. In this paper, based on solving systems of linear equations, we propose an improved Guess and Determine attack on Loiss with a time complexity of 2231 and a data complexity of 268, which reduces the time complexity of the Guess and Determine attack proposed by the designers by a factor of 216. …”
Get full text
Article -
2
Similarity Property and Slide Attack of Block Cipher FESH
Published 2023-01-01“…This paper focuses on similarity properties and extension of the classical slide property of block ciphers. Taking FESH, an award-winning block cipher of the National Cryptographic Algorithm Design Competition 2019, as an example, similarity properties of the encryption and key transformation are found, owing to the similar structures that the encryption and key transformation adopted, and the constants generation. …”
Get full text
Article -
3
IoT enabled data protection with substitution box for lightweight ciphers
Published 2025-03-01“…With the increased bit length of 5, it is observed that DAC exhibits excellent flexibility with traditional block cipher techniques, thus simplifying the use of such a solution as a building block of cryptographic primitives.…”
Get full text
Article -
4
The Security Weakness of Block Cipher Piccolo against Fault Analysis
Published 2014-03-01“…Piccolo is a 64-bit lightweight block cipher which is able to be implemented in constrained hardware environments such as a wireless sensor network. …”
Get full text
Article -
5
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Published 2023-01-01“…Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. …”
Get full text
Article -
6
A new cryptosystem based on an enhanced Vigenere cipher incorporating large SBoxes
Published 2025-01-01Get full text
Article -
7
In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes
Published 2025-02-01“…The results reveal that the SPARX cipher emerged as the most resource-efficient, with the lowest memory footprint, while the RECTANGLE cipher required more memory across platforms.…”
Get full text
Article -
8
Shannon's Random-Cipher Result and the Generalized R-Norm Entropy of Type β
Published 2013-01-01“…Using the Fano inequality for the generalized R-norm entropy and Bayess probability of error, a generalized random-cipher result is proved by taking into account the generalized R-norm entropy of type β.…”
Get full text
Article -
9
Efficient constructions for large‐state block ciphers based on AES New Instructions
Published 2022-05-01Subjects: “…AES‐NI, block cipher, cryptography, private key cryptography…”
Get full text
Article -
10
Comment on ‘Targeted Ciphers for Format‐Preserving Encryption’ from Selected Areas in Cryptography 2018
Published 2021-09-01“…In Selected Areas in Cryptography 2018, two targeted ciphers were proposed as new FPE schemes. The second scheme was designed with an algorithm called Mix–Swap–Unmix that is shown to be equivalent to a particular matching exchange process under a specific setting. …”
Get full text
Article -
11
Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
Published 2021-03-01“…The SM4 cipher is one of the common block ciphers, which can be easily implemented and offers a high level of security. …”
Get full text
Article -
12
Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network
Published 2015-01-01“…To address the above security problems, we proposed a chaotic stream cipher-based cryptographic scheme to realise secure data communications over wireless sensor network (WSN), which is a part of ITS. …”
Get full text
Article -
13
Multistage Encryption for Text Using Steganography and Cryptography
Published 2023-03-01Subjects: “…Caesar Cipher…”
Get full text
Article -
14
Enhancing the robustness of block ciphers through a graphical S-box evolution scheme for secure multimedia applications
Published 2024-12-01Subjects: Get full text
Article -
15
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
Published 2025-01-01Subjects: Get full text
Article -
16
A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption
Published 2024-01-01Subjects: Get full text
Article -
17
Improved integral cryptanalysis of SPNbox in digital rights management systems
Published 2023-01-01Subjects: Get full text
Article -
18
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search
Published 2023-05-01Subjects: Get full text
Article -
19
A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation
Published 2022-01-01Subjects: Get full text
Article -
20
A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application
Published 2022-01-01Subjects: Get full text
Article