Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications

A Kifouche, MS Azzaz, R Hamouche… - International Journal of …, 2022 - Springer
Internet of things (IoT) provides several applications such as intelligent urban transportation,
smart factory, and smart health. In such systems, the transmitted data are important and must …

The qarmav2 family of tweakable block ciphers

R Avanzi, S Banik, O Dunkelman… - Cryptology ePrint …, 2023 - eprint.iacr.org
We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA
(from FSE 2017) to improve its security bounds and allow for longer tweaks, while keeping …

Skinny-aead and skinny-hash

C Beierle, J Jean, S Kölbl, G Leander… - IACR Transactions on …, 2020 - tosc.iacr.org
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of
hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family …

Lightweight authenticated encryption mode suitable for threshold implementation

Y Naito, Y Sasaki, T Sugawara - … on the Theory and Applications of …, 2020 - Springer
This paper proposes tweakable block cipher (TBC) based modes PFB\_Plus PFB _ Plus and
PFB ω PFB ω that are efficient in threshold implementations (TI). Let t be an algebraic …

An automated accurate sound-based amateur drone detection method based on skinny pattern

E Akbal, A Akbal, S Dogan, T Tuncer - Digital Signal Processing, 2023 - Elsevier
Nowadays, the popularity of amateur drones (ADr) has increased marginally, and many
research areas, such as machine learning, security systems, and the military industry, have …

On the construction of near-MDS matrices

KC Gupta, SK Pandey, S Samanta - Cryptography and Communications, 2024 - Springer
The optimal branch number of MDS matrices makes them a preferred choice for designing
diffusion layers in many block ciphers and hash functions. However, in lightweight …

Efficient methods to search for best differential characteristics on SKINNY

S Delaune, P Derbez, P Huynh, M Minier… - … Conference on Applied …, 2021 - Springer
Evaluating resistance of ciphers against differential cryptanalysis is essential to define the
number of rounds of new designs and to mount attacks derived from differential …

Resource-constrained encryption: Extending ibex with a qarma hardware accelerator

M De Kremer, M Brohet, S Banik… - 2023 IEEE 34th …, 2023 - ieeexplore.ieee.org
The increasing prevalence of IoT devices calls for the need for strong, but efficient
cryptography. In this paper we present two instruction set extensions for the lightweight …

SKINNY with scalpel-comparing tools for differential analysis

S Delaune, P Derbez, P Huynh, M Minier… - Cryptology ePrint …, 2020 - eprint.iacr.org
Evaluating resistance of ciphers against differential cryptanalysis is essential to define the
number of rounds of new designs and to mount attacks derived from differential …

Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256

L Qin, X Dong, A Wang, J Hua, X Wang - … on the Theory and Application of …, 2022 - Springer
Designing symmetric ciphers for particular applications becomes a hot topic. At
EUROCRYPT 2020, Naito, Sasaki and Sugawara invented the threshold implementation …