Further observations on the security of Speck32-like ciphers using machine learning
With the widespread deployment of Internet of Things across various industries, the security of communications between different devices is one of the critical concerns to consider. The lightweight cryptography emerges as a specialized solution to address security requirements for resource-constrain...
Saved in:
| Main Authors: | Zezhou Hou, Jiongjiong Ren, Shaozhen Chen |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
PeerJ Inc.
2025-07-01
|
| Series: | PeerJ Computer Science |
| Subjects: | |
| Online Access: | https://peerj.com/articles/cs-3015.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Modified SPECK (M-SPECK) Lightweight Cipher Architecture for Resource-Constrained Applications
by: R. Mohanapriya, et al.
Published: (2025-01-01) -
Optimal combined distinguisher of stream cipher with multiple independent distinguishing characters
by: Hai-ying GAO, et al.
Published: (2012-07-01) -
Novel distinguisher for SM4 cipher algorithm based on deep learning
by: Huijiao WANG, et al.
Published: (2023-07-01) -
Improved machine learning-aided linear cryptanalysis: application to DES
by: Zezhou Hou, et al.
Published: (2025-04-01) -
Conditional differential analysis on the KATAN ciphers based on deep learning
by: Dongdong Lin, et al.
Published: (2023-05-01)