نتایج جستجو برای: simon و speck

تعداد نتایج: 770795  

Journal: :IACR Cryptology ePrint Archive 2015
Dieter Schmidt

PAGES is block cipher family based on the design of Speck, see [1]. However, some intriguing design details of Speck were not used in the design of PAGES. PAGES has block size of 256 bit and comes in three version: PAGES-512, PAGES-768, and PAGES-1024, were the number denotes the key length. The number of rounds is 64, 96, or 128, respectively. PAGES uses variables of 128 bit, that is half the ...

Journal: :IACR Cryptology ePrint Archive 2015
Gilles Barthe Sonia Belaïd François Dupressoir Pierre-Alain Fouque Benjamin Grégoire

The prevailing approach for building masked algorithms that can resist higher-order differential power analysis is to develop gadgets, that is, masked gates used as atomic blocks, that securely implement basic operations from the original algorithm, and then to compose these gadgets, introducing refresh operations at strategic places to guarantee that the complete circuit is protected. These co...

2015
Dieter Schmidt

PAGES is block cipher family based on the design of Speck, see [1]. However, some intriguing design details of Speck were not used in the design of PAGES. PAGES has block size of 256 bit and comes in three version: PAGES-512, PAGES-768, and PAGES-1024, were the number denotes the key length. The number of rounds is 64, 96, or 128, respectively. PAGES uses variables of 128 bit, that is half the ...

2004
B. Moshiri

In this paper, utilization of clustering algorithms for data fusion in decision level is proposed. The results of automatic isolated word recognition, which are derived from speech spectrograph and Linear Predictive Coding (LPC) analysis, are combined with each other by using fuzzy clustering algorithms, especially fuzzy k-means and fuzzy vector quantization. Experimental results show that the ...

2004
Xiaoli Tang William A. Pearlman

Hyperspectral images may be treated as a three-dimensional data set for the purposes of compression. Here we present some compression techniques based on a three-dimensional wavelet transform that produce compressed bit streams with many useful properties. These properties are progressive quality encoding and decoding, progressive lossyto-lossless encoding, and progressive resolution decoding. ...

Journal: :IACR transaction on symmetric cryptology 2021

The introduction of the automatic search boosts cryptanalysis symmetric-key primitives to some degree. However, performance is not always satisfactory for long trails or ciphers with large state sizes. Compared extensive attention on enhancement mixed integer linear programming (MILP) method, few works care acceleration Boolean satisfiability problem (SAT) modulo theories (SMT) method. This pap...

2016
Alex Biryukov Daniel Dinu Johann Großschädl

Side-Channel Analysis (SCA) represents a serious threat to the security of millions of smart devices that form part of the so-called Internet of Things (IoT). Choosing the “right” cryptographic primitive for the IoT is a highly challenging task due to the resource constraints of IoT devices and the variety of primitives. An important criterion to assess the suitability of a lightweight cipher w...

2008
Hazem Akel Farouk Al-Quadan Manar Atoum Mohammed Battikhi

Three strains of facultatively anaerobic thermotolerant and moderately halophilic bacteria were isolated from two Jordanian hot spring locations. The novel Bacillus strains were short rods, Gram-positive, motile and spore formers. The strains were capable of anaerobic (but not aerobic) growth at 63C, moderately halophilic, able to grow at NaCl concentration range of 12 15 % and at temperatures ...

2015
Cong Chen Mehmet Sinan Inci Mostafa Taha Thomas Eisenbarth

Emerging applications such as the Internet of Things require security solutions that are small and low cost, yet feature solid protection against a wide range of sophisticated attacks. Lightweight cryptographic schemes such as the Speck cipher that was recently proposed by the NSA aim to solve some of these challenges. However, before using Speck in any practical application, sound protection a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید