专题:Cryptographic Implementations and Security

This cluster of papers focuses on the cryptanalysis of block ciphers and hash functions, including topics such as side-channel attacks, differential cryptanalysis, security analysis of hardware implementations, lightweight ciphers, fault attacks, and authenticated encryption.
最新文献
Medical Image Encryption Using Chaotic Mechanisms: A Study

review Full Text OpenAlex

A Lightweight Variant of Falcon for Efficient Post-Quantum Digital Signature

article Full Text OpenAlex

Meet-in-the-Middle Key Recovery Attacks on Rocca Using Differential and Integral Properties

article Full Text OpenAlex

A comprehensive study on lattice, code, and hash-based cryptographic algorithms in post-quantum security with practical applications

article Full Text OpenAlex

Applied Cryptography and Network Security

book Full Text OpenAlex

SUL32C: secure ultra-lightweight 32-bit cipher for IoT devices

article Full Text OpenAlex

PQ-Hammer: End-to-End Key Recovery Attacks on Post-Quantum Cryptography Using Rowhammer

article Full Text OpenAlex

Intrusion Detection-Embedded Chaotic Encryption via Hybrid Modulation for Data Center Interconnects

article Full Text OpenAlex

An Analysis of Existing Hash-Based Post-Quantum Signature Schemes

article Full Text OpenAlex

A Novel Lattice-Based Fault Injection Attack Targeting the Nonce in the SM2 Digital Signature Algorithm

article Full Text OpenAlex

近5年高被引文献
Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities

article Full Text OpenAlex 271 FWCI25.526

Ascon v1.2: Lightweight Authenticated Encryption and Hashing

article Full Text OpenAlex 238 FWCI21.198

A fast and efficient multiple images encryption based on single-channel encryption and chaotic system

article Full Text OpenAlex 226 FWCI26.362

Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations

article Full Text OpenAlex 202 FWCI22.223

Indistinguishability obfuscation from well-founded assumptions

article Full Text OpenAlex 195 FWCI14.995

Color Image Encryption Through Chaos and KAA Map

article Full Text OpenAlex 158 FWCI28.278

An efficient color/grayscale image encryption scheme based on hybrid chaotic maps

article Full Text OpenAlex 154 FWCI13.77

Design and application of an S-box using complete Latin square

article Full Text OpenAlex 152 FWCI13.77

F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption

article Full Text OpenAlex 150 FWCI12.936

A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA

article Full Text OpenAlex 147 FWCI14.872