Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Siang Meng Sim"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 1 (2020)
Differential power analysis (DPA) is a form of side-channel analysis (SCA) that performs statistical analysis on the power traces of cryptographic computations. DPA is applicable to many cryptographic primitives, including block ciphers, stream ciphe
Externí odkaz:
https://doaj.org/article/15cd768bc1ee4646858b2da729776171
Autor:
Dahmun Goudarzi, Jérémy Jean, Stefan Kölbl, Thomas Peyrin, Matthieu Rivain, Yu Sasaki, Siang Meng Sim
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
This paper introduces Pyjamask, a new block cipher family and authenticated encryption proposal submitted to the NIST lightweight cryptography standardization process. Pyjamask targets side-channel resistance as one of its main goal. More precisely,
Externí odkaz:
https://doaj.org/article/9eed4702b5994a3fb5deaa4a5fee3fed
Autor:
Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family of tweakable block ciphers, which was presented at CRYPTO 2016, as the underl
Externí odkaz:
https://doaj.org/article/70c29ec3f4f24e6dac16a54472b4ee05
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 130-168 (2017)
We study the synthesis of small functions used as building blocks in lightweight cryptographic designs in terms of hardware implementations. This phase most notably appears during the ASIC implementation of cryptographic primitives. The quality of th
Externí odkaz:
https://doaj.org/article/7bd78d763b4049c7ba17d67c3d745d8d
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 59-83 (2017)
The related-key model is now considered an important scenario for block cipher security and many schemes were broken in this model, even AES-192 and AES-256. Recently were introduced efficient computer-based search tools that can produce the best pos
Externí odkaz:
https://doaj.org/article/14b3d83d29a54760be0ab94cf2447e49
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 33-56 (2016)
We present an invariant subspace attack on the block cipher Midori64, proposed at Asiacrypt 2015. Our analysis shows that Midori64 has a class of 232 weak keys. Under any such key, the cipher can be distinguished with only a single chosen query, and
Externí odkaz:
https://doaj.org/article/db4aa9cbddee4f08aa0aa9e6f8937644
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 1 (2019)
Side-channel analysis constitutes a powerful attack vector against cryptographic implementations. Techniques such as power and electromagnetic side-channel analysis have been extensively studied to provide an efficient way to recover the secret key u
Externí odkaz:
https://doaj.org/article/1c292a6d4cbe4a2e996089002d9bc763
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 1 (2020)
Differential power analysis (DPA) is a form of side-channel analysis (SCA) that performs statistical analysis on the power traces of cryptographic computations. DPA is applicable to many cryptographic primitives, including block ciphers, stream ciphe
Autor:
Stefan Kölbl, Thomas Peyrin, Amir Moradi, Yu Sasaki, Jérémy Jean, Christof Beierle, Siang Meng Sim, Gregor Leander, Pascal Sasdrich
Publikováno v:
IACR Transactions on Symmetric Cryptology; Volume 2020, Special Issue 1 ; 88-131
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family of tweakable block ciphers, which was presented at CRYPTO 2016, as the underl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::010ff7e8e247ba647d1d9c9aa78f5401
Autor:
Matthieu Rivain, Yu Sasaki, Thomas Peyrin, Stefan Kölbl, Siang Meng Sim, Dahmun Goudarzi, Jérémy Jean
Publikováno v:
IACR Transactions on Symmetric Cryptology; Volume 2020, Special Issue 1 ; 31-59
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
This paper introduces Pyjamask, a new block cipher family and authenticated encryption proposal submitted to the NIST lightweight cryptography standardization process. Pyjamask targets side-channel resistance as one of its main goal. More precisely,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4eda27eb5656150bc5e28d4a0bd793ef