Automatic search of meet-in-the-middle and impossible differential attacks

P Derbez, PA Fouque - Annual International Cryptology Conference, 2016 - Springer
Tracking bits through block ciphers and optimizing attacks at hand is one of the tedious task
symmetric cryptanalysts have to deal with. It would be nice if a program will automatically …

RK‐AES: An Improved Version of AES Using a New Key Generation Process with Random Keys

R Saha, G Geetha, G Kumar… - Security and …, 2018 - Wiley Online Library
Advanced Encryption Standard (AES) is a standard algorithm for block ciphers for providing
security services. A number of variations of this algorithm are available in network security …

Survey and benchmark of lightweight block ciphers for MSP430 16‐bit microcontroller

M Cazorla, S Gourgeon, K Marquet… - Security and …, 2015 - Wiley Online Library
For security applications in wireless sensor networks (WSNs), choosing best algorithms in
terms of energy‐efficiency and of small memory requirements is a real challenge because …

A meet-in-the-middle attack on round-reduced mCrypton using the differential enumeration technique

Y Hao, D Bai, L Li - Network and System Security: 8th International …, 2014 - Springer
This paper describes a meet-in-the-middle (MITM) attack against the round reduced
versions of the block cipher mCrypton-64/96/128. We construct a 4-round distinguisher and …

[PDF][PDF] A protocol for synchronizing quantum-derived keys in IPsec and its implementation

S Marksteiner, O Maurhart - 9th Int. Conf. Quantum, Nano/Bio …, 2015 - personales.upv.es
This paper presents a practical solution to the problem of limited bandwidth in Quantum Key
Distribution (QKD)-secured communication through using rapidly rekeyed Internet Protocol …

Research on a Random Mask Infection Countermeasure against Double Fault Attacks

W Wu, X Wan, J Zhang, S Cheng - Applied Sciences, 2023 - mdpi.com
The infection countermeasure, in which the main idea is to prevent adversaries from
exploiting faulty ciphertexts to break the key by spreading the induced fault, is a very …

On the Resilience of a QKD Key Synchronization Protocol for IPsec

S Marksteiner, B Rainer, O Maurhart - arXiv preprint arXiv:1801.01710, 2018 - arxiv.org
This paper presents a practical solution to the problem of limited bandwidth in Quantum Key
Distribution (QKD)-secured communication through using rapidly rekeyed Internet Protocol …

[PDF][PDF] An approach to securing IPsec with Quantum Key Distribution (QKD) using the AIT QKD software

S Marksteiner - 2014 - researchgate.net
Abstract Quantum Key Distribution (QKD) is a cutting-edge security technology that provides
mathematically proven security by using quantum physical effects and information …

[PDF][PDF] Improved meet-in-the-middle attacks on crypton and mCrypton

J Cui, J Guo, Y Huang, Y Liu - KSII Transactions on Internet and …, 2017 - koreascience.kr
Crypton is a SP-network block cipher that attracts much attention because of its excellent
performance on hardware. Based on Crypton, mCrypton is designed as a lightweight block …

Increased Safety of Data Transmission for" Smart" Applications in the Intelligent Transport Systems

S Kamenchenko, A Grakovski - International Conference on Dependability …, 2015 - Springer
The problem of measuring vehicle's weight-in-motion (WIM) is one of the most important
research topics in the field of transport telematics. It is important not only for development of …