Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression

A Canteaut, S Carpov, C Fontaine, T Lepoint… - Journal of …, 2018 - Springer
In typical applications of homomorphic encryption, the first step consists for Alice of
encrypting some plaintext m under Bob's public key pk pk and of sending the ciphertext c …

Privacy in internet of things: From principles to technologies

C Li, B Palanisamy - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Ubiquitous deployment of low-cost smart devices and widespread use of high-speed
wireless networks have led to the rapid development of the Internet of Things (IoT). IoT …

Binary Ring-LWE hardware with power side-channel countermeasures

A Aysu, M Orshansky, M Tiwari - 2018 Design, Automation & …, 2018 - ieeexplore.ieee.org
We describe the first hardware implementation of a quantum-secure encryption scheme
along with its low-cost power side-channel countermeasures. The encryption uses an …

[图书][B] The mathematics of secrets: cryptography from caesar ciphers to digital encryption

J Holden - 2018 - books.google.com
Explaining the mathematics of cryptography The Mathematics of Secrets takes readers on a
fascinating tour of the mathematics behind cryptography—the science of sending secret …

A resource-efficient and side-channel secure hardware implementation of ring-LWE cryptographic processor

D Liu, C Zhang, H Lin, Y Chen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Lattice-based cryptography has shown great potential due to its resistance against quantum
attacks. With the security requirements for high-precision Gaussian sampling and complex …

An intra-slice security solution for emerging 5G networks based on pseudo-random number generators

B Bordel, AB Orúe, R Alcarria… - IEEE …, 2018 - ieeexplore.ieee.org
Future 5G networks must provide communication services to a great and heterogeneous
collection of scenarios: from traditional mobile communications to emerging applications …

On minimum period of nonlinear feedback shift registers in grain-like structure

J Zhong, D Lin - IEEE Transactions on Information Theory, 2018 - ieeexplore.ieee.org
Grain is one of three hardware-oriented finalists of the eSTREAM Project. A nonlinear
feedback shift register (NFSR) in Grain-like structure is a cascade connection of a linear …

Towards low energy stream ciphers

S Banik, V Mikhalev, F Armknecht, T Isobe… - IACR Transactions on …, 2018 - tosc.iacr.org
Energy optimization is an important design aspect of lightweight cryptography. Since low
energy ciphers drain less battery, they are invaluable components of devices that operate on …

Correlation cube attacks: From weak-key distinguisher to key recovery

M Liu, J Yang, W Wang, D Lin - … on the Theory and Applications of …, 2018 - Springer
In this paper, we describe a new variant of cube attacks called correlation cube attack. The
new attack recovers the secret key of a cryptosystem by exploiting conditional correlation …

A key-recovery attack on 855-round Trivium

X Fu, X Wang, X Dong, W Meier - Annual International Cryptology …, 2018 - Springer
In this paper, we propose a key-recovery attack on Trivium reduced to 855 rounds. As the
output is a complex Boolean polynomial over secret key and IV bits and it is hard to find the …