IoT devices have been widely used with the advent of 5G.These devices contain a large amount of private data during transmission.It is primely important for ensuring their security.Therefore,we proposed a lightweight ...
supported by the National Natural Science Foundation of China(Grant Nos.61872040,U1836101,61871037,62002021);National Cryptography Development Fund(MMJ20170201);Beijing Natural Science Foundation(4202070).
Despite Kerckhoff’s principle,there are secret ciphers with unknown components for diplomatic or military usages.The side-channel analysis of reverse engineering(SCARE)is developed for analyzing secret ciphers.Consid...
The work was supported in part by the National Natural Science Foundation of China(Grant No.61872103);in part by Guangxi Science and Technology Foundation(Guike AB18281019,Guike AD18281026);in part by Guangxi Natural Science Foundation(2019GXNSFGA245004);in part by the Foundation of Ministry of Education Key Laboratory of Cognitive Radio and Information Processing(Guilin University of Electronic Technology)(CRKL180107).
Highly nonlinear resilient functions play a crucial role in nonlinear combiners which are usual hardware oriented stream ciphers.During the past three decades,the main idea of construction of highly nonlinear resilien...
Substitution boxes (S-boxes) are often used as the most important nonlinear components in many symmetric encryption algorithms. The cryptographic properties of an S-box directly affect the security of the whole ciph...