Lightweight cryptographic protocols for IoT-constrained devices: A survey

MN Khan, A Rao, S Camtepe - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is an emergent and evolving technology, interconnecting the cyber
and physical worlds. IoT technology finds applications in a broad spectrum of areas such as …

Attacks only get better: how to break FF3 on large domains

VT Hoang, D Miller, N Trieu - … 38th Annual International Conference on the …, 2019 - Springer
We improve the attack of Durak and Vaudenay (CRYPTO'17) on NIST Format-Preserving
Encryption standard FF3, reducing the running time from O (N^ 5) O (N 5) to O (N^ 17/6) O …

保留格式加密的双扰工作模式.

张玉安, 王野, 漆骏锋, 胡伯良 - Information Technology & …, 2022 - search.ebscohost.com
Small block sizes may lead to the information leakage of plaintext due to the cipher block
repetition in the block cipher! s ECB or CBC mode. This paper presents an innovative block …

Data hiding for ensuring the quality of the host image and the security of the message

H Sun, H Luo, Y Sun - IEEE Access, 2019 - ieeexplore.ieee.org
Concealing a message in the APPn markers of a JPEG image not only protects the security
of the message but also induces no change to the quality of the image. However, from the …

A generic framework for decomposing block cipher structure with secret components

J Zhang, T Cui, C Jin - Journal of Information Security and Applications, 2021 - Elsevier
In this paper, we present a generic framework for decomposing block cipher structure with
secret components. The generic framework is based on the zero-correlation linear …

[图书][B] Secure Messaging: From Systems to Theory

J Jaeger - 2019 - search.proquest.com
The standard view of cryptography is that secure systems should be built by implementing
known primitives whose theoretical security guarantees are well understood. In this work we …

Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models

AN Udovenko - 2019 - orbilu.uni.lu
Cryptography studies secure communications. In symmetric-key cryptography, the
communicating parties have a shared secret key which allows both to encrypt and decrypt …

[引用][C] Lightweight and Post-Quantum Safe Security Solutions for IoT Systems

MN Khan - 2022 - RMIT University