Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Vishnu Asutosh Dasu"'
Publikováno v:
IEEE Access, Vol 11, Pp 54175-54187 (2023)
Machine Learning (ML) is almost ubiquitously used in multiple disciplines nowadays. Recently, we have seen its usage in the realm of differential distinguishers for symmetric key ciphers. It has been shown that ML-based differential distinguishers ca
Externí odkaz:
https://doaj.org/article/8835f2ecc6d1456c9188a6a9cc8e996a
Autor:
Satyam Kumar, Vishnu Asutosh Dasu, Anubhab Baksi, Santanu Sarkar, Dirmanto Jap, Jakub Breier, Shivam Bhasin
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2022, Iss 2 (2022)
Side Channel Attack (SCA) exploits the physical information leakage (such as electromagnetic emanation) from a device that performs some cryptographic operation and poses a serious threat in the present IoT era. In the last couple of decades, there h
Externí odkaz:
https://doaj.org/article/042f7fa9b7d94577b0d3bfe84b76a70a
Publikováno v:
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security.
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030816445
ACNS Workshops
ACNS Workshops
A linear layer, which is basically a binary non-singular matrix, is an integral part of cipher construction. As a result, optimising it for device implementation is an important research direction. The Boyar-Peralta’s algorithm (Eprint’09) is one
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::98df9979b7c070bc49f2eda7abd8159f
https://doi.org/10.1007/978-3-030-81645-2_29
https://doi.org/10.1007/978-3-030-81645-2_29
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030816445
ACNS Workshops
ACNS Workshops
The linear layer (which can be equivalently expressed as a binary non-singular matrix) is an essential component in modern cipher construction. Thus a low-cost implementation of the linear layer is needed in order to reduce the cost for the overall c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7e151cfb15af283613dfadf38ea05cfa
https://doi.org/10.1007/978-3-030-81645-2_30
https://doi.org/10.1007/978-3-030-81645-2_30
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030925178
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bb5382a5d427d4413d64602c9ae0e6d4
https://doi.org/10.1007/978-3-030-92518-5_7
https://doi.org/10.1007/978-3-030-92518-5_7
Publikováno v:
SoCC
This article presents the ‘LIGHTER-R’ tool that aims at implementing a given 4-bit SBox using reversible logic libraries. An SBox is a basic building block in the symmetric key cryptography. In order to analyze the security of the symmetric key a