IRS-aided energy-efficient secure WBAN transmission based on deep reinforcement learning

L Xiao, S Hong, S Xu, H Yang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Wireless body area networks (WBANs) are vulnerable to active eavesdropping that
simultaneously perform sniffing and jamming to raise the sensor transmit power, and thus …

Lightweight block ciphers for resource-constrained environments: A comprehensive survey

Y Zhong, J Gu - Future Generation Computer Systems, 2024 - Elsevier
With the rapid advancements in information technologies such as 5G and cloud computing,
Internet of Things (IoT) applications are expanding across various domains, such as smart …

Simplified modeling of MITM attacks for block ciphers: New (quantum) attacks

A Schrottenloher, M Stevens - IACR Transactions on Symmetric …, 2023 - inria.hal.science
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block
ciphers and preimage attacks on hash functions. Nowadays, cryptographers use automatic …

Cryfa: a secure encryption tool for genomic data

M Hosseini, D Pratas, AJ Pinho - Bioinformatics, 2019 - academic.oup.com
The ever-increasing growth of high-throughput sequencing technologies has led to a great
acceleration of medical and biological research and discovery. As these platforms advance …

Biclique cryptanalysis of MIBS‐80 and PRESENT‐80 block ciphers

MH Faghihi Sereshgi, M Dakhilalian… - Security and …, 2016 - Wiley Online Library
PRESENT and MIBS are two lightweight block ciphers that are suitable for low resource
devices such as radio‐frequency identification tags. In this paper, we present the first …

[图书][B] Security of ubiquitous computing systems: Selected topics

G Avoine, J Hernandez-Castro - 2021 - library.oapen.org
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the
objective of which was to improve and adapt existent cryptanalysis methodologies and tools …

Catalog and illustrative examples of lightweight cryptographic primitives

A Mileva, V Dimitrova, O Kara, MJ Mihaljević - Security of ubiquitous …, 2021 - Springer
The main objective of this chapter is to offer to practitioners, researchers and all interested
parties a brief categorized catalog of existing lightweight symmetric primitives with their main …

Impossible differential cryptanalysis of Piccolo lightweight block cipher

SA Azimi, Z Ahmadian, J Mohajeri… - 2014 11th International …, 2014 - ieeexplore.ieee.org
This paper analyzes the Piccolo family of lightweight block ciphers against the impossible
differential cryptanalysis. A combination of some ploys such as decreasing the S-box …

Generalized meet in the middle cryptanalysis of block ciphers with an automated search algorithm

S Ahmadi, MR Aref - IEEE Access, 2019 - ieeexplore.ieee.org
Meet in the middle (MITM) attack is one of the most important and applicable methods for
cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is …

MILP‐based automatic differential search for LEA and HIGHT block ciphers

E Bagherzadeh, Z Ahmadian - IET Information Security, 2020 - Wiley Online Library
The authors use the mixed‐integer linear programming (MILP) technique for the automatic
search for differential characteristics of LEA and HIGHT ciphers. They show that the MILP …