Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols

U Banerjee, TS Ukyab, AP Chandrakasan - arXiv preprint arXiv …, 2019 - arxiv.org
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be
rendered insecure by Shor's algorithm when large-scale quantum computers are built …

MILP-aided method of searching division property using three subsets and applications

S Wang, B Hu, J Guan, K Zhang, T Shi - … on the Theory and Application of …, 2019 - Springer
Division property is a generalized integral property proposed by Todo at EUROCRYPT
2015, and then conventional bit-based division property (CBDP) and bit-based division …

An efficient implementation of the NewHope key exchange on FPGAs

Y Xing, S Li - IEEE Transactions on Circuits and Systems I …, 2019 - ieeexplore.ieee.org
Lattice based cryptography plays an important role in the construction of post-quantum
cryptography, including key exchange, public key encryption as well as digital signature …

{COMA}: Communication and Obfuscation Management Architecture

KZ Azar, F Farahmand, HM Kamali… - … on Research in Attacks …, 2019 - usenix.org
In this paper, we introduce a novel Communication and Obfuscation Management
Architecture (COMA) to handle the storage of the obfuscation key and to secure the …

CRC-PUF: A machine learning attack resistant lightweight PUF construction

E Dubrova, O Näslund, B Degen… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Adversarial machine learning is an emerging threat to security of Machine Learning (ML)-
based systems. However, we can potentially use it as a weapon against ML-based attacks …

Revisit division property based cube attacks: key-recovery or distinguishing attacks?

CD Ye, T Tian - IACR Transactions on Symmetric Cryptology, 2019 - tosc.iacr.org
Cube attacks are an important type of key recovery attacks against stream ciphers. In
particular, they are shown to be powerful against Trivium-like ciphers. Traditional cube …

An AEAD variant of the grain stream cipher

M Hell, T Johansson, W Meier, J Sönnerup… - … Conference on Codes …, 2019 - Springer
A new Grain stream cipher, denoted Grain-128AEAD is presented, with support for
authenticated encryption with associated data. The cipher takes a 128-bit key and a 96-bit IV …

XOR-counts and lightweight multiplication with fixed elements in binary finite fields

L Kölsch - Advances in Cryptology–EUROCRYPT 2019: 38th …, 2019 - Springer
XOR-metrics measure the efficiency of certain arithmetic operations in binary finite fields. We
prove some new results about two different XOR-metrics that have been used in the past. In …

Stream vs block ciphers for scan encryption

E Valea, M Da Silva, ML Flottes, G Di Natale… - Microelectronics …, 2019 - Elsevier
Abstract Security in the Integrated Circuits (IC) domain is an important challenge, especially
with regard to the side channel offered by test infrastructures. Test interfaces provide access …

[PDF][PDF] Hardware implementation of lightweight chaos-based stream cipher

G Gautier, M Le Glatin, S El Assad… - … and Cyber-Systems …, 2019 - personales.upv.es
Due to the proliferation of connected devices, the development of secured and low-resource
cryptographic systems has become a real challenge. In fact, ciphering algorithms have not …