A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues

BJ Mohd, T Hayajneh, AV Vasilakos - Journal of Network and Computer …, 2015 - Elsevier
This paper investigates the lightweight block ciphers׳ implementations, which have received
a fair amount of research for their essential security role in low-resource devices. Our …

A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments

JH Kong, LM Ang, KP Seng - Journal of Network and Computer …, 2015 - Elsevier
Modern cryptographic algorithms play an irreplaceable role in data communication systems
for various areas of applications. These algorithms are the backbone of data protection and …

DDoS attacks and defense mechanisms: classification and state-of-the-art

C Douligeris, A Mitrokotsa - Computer networks, 2004 - Elsevier
Denial of Service (DoS) attacks constitute one of the major threats and among the hardest
security problems in today's Internet. Of particular concern are Distributed Denial of Service …

The boomerang attack

D Wagner - International Workshop on Fast Software Encryption, 1999 - Springer
This paper describes a new differential-style attack, which we call the boomerang attack.
This attack has several interesting applications. First, we disprove the oft-repeated claim that …

Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials

E Biham, A Biryukov, A Shamir - … Conference on the Theory and Application …, 1999 - Springer
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials Page 1
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials Eli Biham1 …

Distributed denial of service attacks

F Lau, SH Rubin, MH Smith… - Smc 2000 conference …, 2000 - ieeexplore.ieee.org
We discuss distributed denial of service attacks in the Internet. We were motivated by the
widely known February 2000 distributed attacks on Yahoo!, Amazon. com, CNN. com, and …

Detecting distributed denial of service attacks: methods, tools and future directions

MH Bhuyan, HJ Kashyap… - The Computer …, 2014 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attack is a coordinated attack, generally performed on a
massive scale on the availability of services of a target system or network resources. Owing …

Miss in the Middle Attacks on IDEA and Khufu

E Biham, A Biryukov, A Shamir - … 6th International Workshop, FSE'99 Rome …, 1999 - Springer
In a recent paper we developed a new cryptanalytic technique based on impossible
differentials, and used it to attack the Skipjack encryption algorithm reduced from 32 to 31 …

Extended Generalized Feistel Networks Using Matrix Representation to Propose a New Lightweight Block Cipher: Lilliput

TP Berger, J Francq, M Minier… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
While Generalized Feistel Networks (GFNs) have been widely studied in the literature as a
building block of a block cipher, we recall in this paper the results of [1] where a unified …

RFC 4949: Internet Security Glossary, Version 2

R Shirey - 2007 - dl.acm.org
This Glossary provides definitions, abbreviations, and explanations of terminology for
information system security. The 334 pages of entries offer recommendations to improve the …