|
|
|
Stanislav Marochok and Pavol Zajac
Cryptographic S-boxes are vectorial Boolean functions that must fulfill strict criteria to provide security for cryptographic algorithms. There are several existing methods for generating strong cryptographic S-boxes, including stochastic search algorith...
ver más
|
|
|
|
|
|
|
P. Ashok and B. Bala Tripura Sundari
Stochastic circuits are used in applications that require low area and power consumption. The computing performed using these circuits is referred to as Stochastic computing (SC). The arithmetic operations in this computing can be realized using minimum ...
ver más
|
|
|
|
|
|
|
Jintao Rao and Zhe Cui
The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key. In this paper, we propose a new c...
ver más
|
|
|
|
|
|
|
Khumbelo Muthavhine and Mbuyu Sumbwanyambe
Cryptographic algorithms installed on Internet of Things (IoT) devices suffer many attacks. Some of these attacks include the differential linear attack (DL). The DL attack depends on the computation of the probability of differential-linear characterist...
ver más
|
|
|
|
|
|
|
Nursulu Kapalova, Kairat Sakan, Kunbolat Algazy and Dilmukhanbet Dyusenbayev
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides five-round encryption of 128-bit blocks, while the data size at the input and output of the S-box is 8 bits. The main transformation is the F transformat...
ver más
|
|
|
|
|
|
|
Bashar Saadoon Mahdi, Mustafa Jasim Hadi and Ayad Rodhan Abbas
Computer security depends mainly on passwords to protect human users from attackers. Therefore, manual and alphanumerical passwords are the most frequent type of computer authentication. However, creating these passwords has significant drawbacks. For ex...
ver más
|
|
|
|
|
|
|
Carlos Miguel Legón-Pérez, Jorge Ariel Menéndez-Verdecía, Ismel Martínez-Díaz, Guillermo Sosa-Gómez, Omar Rojas and Germania del Roció Veloz-Remache
During the search for S-boxes resistant to Power Attacks, the S-box space has recently been divided into Hamming Weight classes, according to its theoretical resistance to these attacks using the metric variance of the confusion coefficient. This partiti...
ver más
|
|
|
|
|
|
|
Ali Takieldeen, Said H. Abd Elkhalik, Ahmed S. Samra, Mohamed A. Mohamed and Fahmi Khalifa
With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending...
ver más
|
|
|
|
|
|
|
Evgenia Ishchukova, Ekaterina Maro and Pavel Pristalov
In January 2016, a new standard for symmetric block encryption was established in the Russian Federation. The standard contains two encryption algorithms: Magma and Kuznyechik. In this paper we propose to consider the possibility of applying the algebrai...
ver más
|
|
|
|
|
|
|
A. Prathiba and V. S. Kanchana Bhaaskaran
-
|
|
|
|