Zobrazeno 1 - 10
of 328
pro vyhledávání: '"Dongdai Lin"'
Publikováno v:
Cybersecurity, Vol 5, Iss 1, Pp 1-16 (2022)
Abstract Nonlinear feedback shift register (NFSR) is one of the most important cryptographic primitives in lightweight cryptography. At ASIACRYPT 2010, Knellwolf et al. proposed conditional differential attack to perform a cryptanalysis on NFSR-based
Externí odkaz:
https://doaj.org/article/7941cde1c89c4b2aa9eabe61ad328842
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 2 (2023)
Lattice reduction algorithms have been proved to be one of the most powerful and versatile tools in public key cryptanalysis. In this work, we primarily concentrate on lattice attacks against (EC)DSA with nonce leakage via some sidechannel analysis.
Externí odkaz:
https://doaj.org/article/ae526f4636ea47a0a59f4214e702d3e3
Publikováno v:
Cybersecurity, Vol 4, Iss 1, Pp 1-14 (2021)
Abstract In this paper, we greatly increase the number of impossible differentials for SIMON and SIMECK by eliminating the 1-bit constraint in input/output difference, which is the precondition to ameliorate the complexity of attacks. We propose an a
Externí odkaz:
https://doaj.org/article/c217de0f7e764bb9bd0fe49674f6c332
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 169-187 (2017)
As a core component of SPN block cipher and hash function, diffusion layer is mainly introduced by matrices built from maximum distance separable (MDS) codes. Up to now, most MDS constructions require to perform an equivalent or even exhaustive searc
Externí odkaz:
https://doaj.org/article/dfb1b248eb024a12a5ef10d9c49a1c87
Autor:
Haiyan Wang, Qiuzhen Lin, Jianyong Chen, Jianqiang Li, Jianghua Zhong, Dongdai Lin, Jia Wang, Lijia Ma
Publikováno v:
Complexity, Vol 2019 (2019)
Nonlinear feedback shift registers (NFSRs) are the main building blocks in many convolutional decoders, and a stable NFSR can limit decoding error propagation. Due to lack of efficient algebraic tools, the stability of multi-valued NFSRs has been muc
Externí odkaz:
https://doaj.org/article/daf66cc2006841a38f21c436927f6983
Publikováno v:
Security and Communication Networks. 2023:1-16
We consider the efficient hardware implementation of Grain-128AEADv2, which is the second version of Grain-128AEAD (one of the lightweight cryptography finalist candidates). In order to counteract side-channel attacks, the efficient masked hardware i
Autor:
Ming Li, Dongdai Lin
Publikováno v:
IEEE Transactions on Information Theory. 69:598-609
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 20:522-538
Publikováno v:
Designs, Codes and Cryptography. 91:221-239
Publikováno v:
Information Security and Cryptology ISBN: 9783031265525
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d31a5f7e516b151fb64f9ba50417d919
https://doi.org/10.1007/978-3-031-26553-2_18
https://doi.org/10.1007/978-3-031-26553-2_18