State of the art in lightweight symmetric cryptography

A Biryukov, L Perrin - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Lightweight cryptography has been one of the" hot topics" in symmetric cryptography in the
recent years. A huge number of lightweight algorithms have been published, standardized …

Mind the gap-A closer look at the security of block ciphers against differential cryptanalysis

R Ankele, S Kölbl - International Conference on Selected Areas in …, 2018 - Springer
Resistance against differential cryptanalysis is an important design criteria for any modern
block cipher and most designs rely on finding some upper bound on probability of single …

CSL: FPGA implementation of lightweight block cipher for power-constrained devices

HS Lamkuche, D Pramod - International Journal of …, 2020 - inderscienceonline.com
The exploration of interconnected devices, embedded devices, sensors, and various
network-connected devices helps to communicate each other and exchange …

A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices

S Kumar, D Kumar, R Dangi, G Choudhary… - … Materials and Continua, 2024 - orbit.dtu.dk
The widespread and growing interest in the Internet of Things (IoT) may be attributed to its
usefulness in many different fields. Physical settings are probed for data, which is then …

Improved (related-key) differential cryptanalysis on LBlock

J Shi, G Liu, C Li, T Fan - Journal of Information Security and Applications, 2024 - Elsevier
LB lock presented at ACNS 2011 is a lightweight block cipher. The length of the block and
master key for LB lock is 64 and 80 bits, respectively. LB lock adopts the Feistel-SP network …

[HTML][HTML] Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers

W Cao, W Zhang - Cybersecurity, 2021 - Springer
For block ciphers, Bogdanov et al. found that there are some linear approximations
satisfying that their biases are deterministically invariant under key difference. This property …

Automatic Demirci–Selçuk Meet-In-The-Middle Attack On SIMON

Y Lv, D Shi, Y Guo, Q Chen, L Hu… - The Computer Journal, 2023 - academic.oup.com
Demirci–Selçuk meet-in-the-middle (DS-MITM) attack is an effective method for
cryptanalysis. As far as we know, the published automatic results of DS-MITM attack are all …

Cryptanalysis of Rijndael-192/224 in Single Key Setting

J Cui, J Guo, Y Liu - Trusted Computing and Information Security: 11th …, 2017 - Springer
Rijndael was the finalist of Advanced Encryption Standard (AES) competition and Rijndael-
128 with the 128-bit block size was selected as the standard. In this paper, we concentrate …

[PDF][PDF] ANALYSIS OF LIGHTWEIGHT AND EFFICIENT SYMMETRIC-KEY PRIMITIVES

C Cid, S Murphy, V Rijmen - pure.royalholloway.ac.uk
Symmetric-key primitives are used to ensure the confidentiality of two or more parties to
maintain a private communication channel. While legacy cryptographic primitives just …