专题:Cryptographic Implementations and Security

This cluster of papers focuses on the cryptanalysis of block ciphers and hash functions, including topics such as side-channel attacks, differential cryptanalysis, security analysis of hardware implementations, lightweight ciphers, fault attacks, and authenticated encryption.
最新文献
Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption

article Full Text OpenAlex

Efficient Programable Architecture for LWC NIST FIPS Standard ASCON

article Full Text OpenAlex

Discrete Spectral Encryption of Single-Carrier Signals With Pseudo Random Dynamic Keys

article Full Text OpenAlex

A Lightweight Hardware-Assisted Security Method for eFPGA Edge Devices

article Full Text OpenAlex

Active Learning for Detecting Hardware Sensors-Based Side-Channel Attack on Smartphone

article Full Text OpenAlex

Asymmetric multi-image encoding and hiding scheme with structured fingerprint phase masks using gyrator transform and phase-shifting digital holography

article Full Text OpenAlex

Hardware Acceleration of Authenticated Encryption with Associated Data via RISC-V Instruction Set Extensions in Low Power Embedded Systems

article Full Text OpenAlex

Design of Time-Delay Convolutional Neural Networks(TDCNN) Model for Feature Extraction for Side-Channel Attacks

article Full Text OpenAlex

Advancing the Idea of Probabilistic Neutral Bits: First Key Recovery Attack on 7.5 Round ChaCha

article Full Text OpenAlex

Ascon MAC, PRF, and Short-Input PRF

book-chapter Full Text OpenAlex

近5年高被引文献
Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities

article Full Text OpenAlex 326 FWCI34.71147949

Ascon v1.2: Lightweight Authenticated Encryption and Hashing

article Full Text OpenAlex 311 FWCI30.19616508

A fast and efficient multiple images encryption based on single-channel encryption and chaotic system

article Full Text OpenAlex 279 FWCI34.53791252

Compromising emanations: eavesdropping risks of computer displays

article Full Text OpenAlex 250 FWCI0

Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations

article Full Text OpenAlex 250 FWCI26.63621227

F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption

article Full Text OpenAlex 219 FWCI22.01215772

Two remarks on public key cryptology

article Full Text OpenAlex 208 FWCI0

Indistinguishability obfuscation from well-founded assumptions

article Full Text OpenAlex 207 FWCI21.72995057

Color Image Encryption Through Chaos and KAA Map

article Full Text OpenAlex 197 FWCI35.847763

Lightweight cryptography in IoT networks: A survey

article Full Text OpenAlex 192 FWCI17.92015404