A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments

JH Kong, LM Ang, KP Seng - Journal of Network and Computer …, 2015 - Elsevier
Modern cryptographic algorithms play an irreplaceable role in data communication systems
for various areas of applications. These algorithms are the backbone of data protection and …

Cyber security in new space: analysis of threats, key enabling technologies and challenges

M Manulis, CP Bridges, R Harrison, V Sekar… - International Journal of …, 2021 - Springer
Developments in technologies, attitudes and investment are transforming the space
environment, achieving greater accessibility for an increasing number of parties. New and …

A single-key attack on the full GOST block cipher

T Isobe - Journal of cryptology, 2013 - Springer
The GOST block cipher is the Russian encryption standard published in 1989. In spite of
considerable cryptanalytic efforts over the past 20 years, a key recovery attack on the full …

Related-key rectangle attack on 36 rounds of the XTEA block cipher

J Lu - International Journal of Information Security, 2009 - Springer
XTEA is a 64-round block cipher with a 64-bit block size and a 128-bit user key, which was
designed as a short C program that would run safely on most computers. In this paper, we …

Pseudorandom functions and permutations provably secure against related-key attacks

M Bellare, D Cash - Annual Cryptology Conference, 2010 - Springer
This paper fills an important foundational gap with the first proofs, under standard
assumptions and in the standard model, of the existence of PRFs and PRPs resisting rich …

Contikisec: A secure network layer for wireless sensor networks under the contiki operating system

L Casado, P Tsigas - Identity and Privacy in the Internet Age: 14th Nordic …, 2009 - Springer
In this paper we introduce ContikiSec, a secure network layer for wireless sensor networks,
designed for the Contiki Operating System. ContikiSec has a configurable design, providing …

Related-key rectangle attacks on reduced AES-192 and AES-256

J Kim, S Hong, B Preneel - International Workshop on Fast Software …, 2007 - Springer
This paper examines the security of AES-192 and AES-256 against a related-key rectangle
attack. We find the following new attacks: 8-round reduced AES-192 with 2 related keys, 10 …

256 bit standardized crypto for 650 GE–GOST revisited

A Poschmann, S Ling, H Wang - International Workshop on Cryptographic …, 2010 - Springer
The former Soviet encryption algorithm GOST 28147-89 has been standardized by the
Russian standardization agency in 1989 and extensive security analysis has been done …

ITUbee: a software oriented lightweight block cipher

F Karakoç, H Demirci, AE Harmancı - … 2013, Gebze, Turkey, May 6-7, 2013 …, 2013 - Springer
In this paper, we propose a software oriented lightweight block cipher, ITUbee. The cipher is
especially suitable for resource constrained devices including an 8-bit microcontroller such …

Improved attacks on full GOST

I Dinur, O Dunkelman, A Shamir - … FSE 2012, Washington, DC, USA, March …, 2012 - Springer
GOST is a well known block cipher which was developed in the Soviet Union during the
1970's as an alternative to the US-developed DES. In spite of considerable cryptanalytic …