A novel architectural framework on IoT ecosystem, security aspects and mechanisms: a comprehensive survey

M Bouzidi, N Gupta, FA Cheikh, A Shalaginov… - IEEE …, 2022 - ieeexplore.ieee.org
For the past few years, the Internet of Things (IoT) technology continues to not only gain
popularity and importance, but also witnesses the true realization of everything being smart …

Machine learning-assisted differential distinguishers for lightweight ciphers

A Baksi, A Baksi - Classical and Physical Security of Symmetric Key …, 2022 - Springer
At CRYPTO'19, Gohr first introduces the deep learning-based cryptanalysis on round-
reduced SPECK. Using a deep residual network, Gohr trains several neural network-based …

A threshold implementation-based neural network accelerator with power and electromagnetic side-channel countermeasures

S Maji, U Banerjee, SH Fuller… - IEEE Journal of Solid …, 2022 - ieeexplore.ieee.org
With the recent advancements in machine learning (ML) theory, a lot of energy-efficient
neural network (NN) accelerators have been developed. However, their associated side …

Superball: a new approach for MILP modelings of Boolean functions

T Li, Y Sun - IACR Transactions on Symmetric Cryptology, 2022 - tosc.iacr.org
Abstract Mixed Integer Linear Programming (MILP) solver has become one of the most
powerful tools of searching for cryptographic characteristics. It has great significance to study …

Stretching cube attacks: improved methods to recover massive superpolies

J He, K Hu, B Preneel, M Wang - … on the Theory and Application of …, 2022 - Springer
Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special
polynomial, the superpoly, and subsequently the secret key. When the algebraic normal …

Guarding machine learning hardware against physical side-channel attacks

A Dubey, R Cammarota, V Suresh, A Aysu - ACM Journal on Emerging …, 2022 - dl.acm.org
Machine learning (ML) models can be trade secrets due to their development cost. Hence,
they need protection against malicious forms of reverse engineering (eg, in IP piracy). With a …

MID-Crypt: a cryptographic algorithm for advanced medical images protection

A Ahmad, Y AbuHour, R Younisse, Y Alslman… - Journal of Sensor and …, 2022 - mdpi.com
Privacy-preserving of medical information (such as medical records and images) is an
essential right for patients to ensure security against undesired access parties. This right is …

Observability of Galois nonlinear feedback shift registers

W Kong, J Zhong, D Lin - Science China Information Sciences, 2022 - Springer
Nonlinear feedback shift registers (NFSRs) have been used in many recent stream ciphers.
They are generally classified into Fibonacci NFSRs and Galois NFSRs according to their …

Quantum algorithm for Boolean equation solving and quantum algebraic attack on cryptosystems

YA Chen, XS Gao - Journal of Systems Science and Complexity, 2022 - Springer
This paper presents a quantum algorithm to decide whether a Boolean equation system F
has a solution and to compute one if F does have solutions with any given success …

Side channel attack on stream ciphers: a three-step approach to state/key recovery

S Kumar, VA Dasu, A Baksi… - IACR Trans …, 2022 - silicon-austria-labs.elsevierpure.com
Abstract Side Channel Attack (SCA) exploits the physical information leakage (such as
electromagnetic emanation) from a device that performs some cryptographic operation and …