نتایج جستجو برای: nist lightweight cryptography competition
تعداد نتایج: 149027 فیلتر نتایج به سال:
Randomness testing plays an important role in cryptography. Randomness is typically examined by batteries of statistical tests. One of the most frequently used test batteries is the NIST Statistical Test Suite. The tests of randomness should be rather fast since they usually process large volumes of data. Unfortunately, this is not the case for the NIST STS, where a complete test can take hours...
Contrary to conventional cryptographic wisdom, the NIST SP 800-56A standard ex-plicitly allows the use of a static key pair in more than one of the key establishment protocolsdescribed in the standard. In this paper, we give examples of key establishment protocols that are individually secure, but which are insecure when static key pairs are reused in two of the protocols.We also pr...
The second round of the NIST public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). Computational efficiency of the algorithms in hardware is to be addressed during the second round of the contest. For software implementations NIST specifies an application programming interface (API) along with reference implementation for each of ...
Duplex-based authenticated encryption modes with a sufficiently large key length are proven to be secure up the birthday bound $$2^{\frac{c}{2}}$$ , where c is capacity. However this not known tight and complexity of best generic attack, which based on multicollisions, much larger: it reaches $$\frac{2^c}{\alpha }$$ $$\alpha $$ represents small security loss factor. There thus an uncertainty tr...
Grain-128AEAD is a lightweight authenticated encryption stream cipher and one of the finalists in National Institute Standards Technology (NIST) Lightweight Cryptography (LWC) project. This paper provides an independent third-party analysis against fault attacks. We investigate application three differential attack models on Grain-128AEAD. All these attacks can recover initial state First, we d...
With the development of quantum computing, existing cryptography schemes based on classical cryptographic primitives will no longer be secure. Hence, cryptographers are designing post-quantum (PQC) schemes, and ideal lattice-based has emerged as a prime candidate. Today, becomes more mature, its performance an important optimization goal. In cryptography, polynomial arithmetic sampling most tim...
This book is a comprehensive guide to networks of Radio Frequency Identification (RFID) based Electronic Product Codes (EPCs) in supply chains, and its topics range from standardised hardware designs through known vulnerabilities, security and privacy models, and to concrete proposals for RFID authentication in various scenarios: machine readable documents, oneand two-way authentication in supp...
For constrained devices, standard cryptographic algorithms can be too big, too slow or too energy-consuming. The area of lightweight cryptography studies new algorithms to overcome these problems. In this paper, we will focus on symmetric-key encryption, authentication and hashing. Instead of providing a full overview of this area of research, we will highlight three interesting topics. Firstly...
The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full control over the pervasive device, additionally to the cryptographic attacks the whole field of physical attacks has to be considered. Most notably are here so-called side channel attacks, such as Differential Power Analysis (DPA) a...
This paper presents the motivation behind the new joint NIST/IEEE Virtual Manufacturing Automation Competition (VMAC). This competition strives to take the Automated Guided Vehicle (AGV) user community driven requirements and turn them into a low-entry-barrier competition. The objectives, scoring, performance metrics, and operation of the competition are explained. In addition, the entry-barrie...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید