PLCrypto is the first ST-based cryptographic library that is executable on commercial off-the-shelf PLCs. PLCrypto includes a wide range of commonly used algorithms, totaling ten algorithms, including one-way functions, message authentication codes, hash functions, block ciphers, and pseudo-random functions/generators. This repository contains the source codes for the paper "PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers" in IACR Transactions on Symmetric Cryptology, 2021
In order to check the applicability and correctness of any designed algorithm, it is must to write a...
Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptograp...
Cryptographic algorithms, protocols, and applications are difficult to implement correctly, and erro...
PLCrypto is the first ST-based cryptographic library that is executable on commercial off-the-shelf ...
Programmable Logic Controllers (PLCs) are control devices widely used in industrial automation. They...
Programmable Logic Controllers (PLCs) are control devices widely used in industrial automation. They...
Abstract. Secure Multi-party Computation (SMC) enables secure dis-tributed computation of arbitrary ...
This book focuses on protocols and constructions that make good use of symmetric pseudo random funct...
Programmable Logic Controllers (PLCs) are a family of embedded devices used for physical process con...
We provide an overview of selected crypto-hardware devices, with a special reference to the lightwei...
Power-line communications (PLC) use publicly accessible power-lines for the transmission of data. Th...
Includes bibliographical references (pages 89)CRYPTO is a computer-aided laboratory for cryptographi...
The paper presents an overview of recent developments in the design of cryptographic algorithms. A s...
Digital Signal Processing (DSP) has become part of many electronic applications these days; confluen...
This paper is an introduction to cryptography. It covers secretkey message-authentication codes, unp...
In order to check the applicability and correctness of any designed algorithm, it is must to write a...
Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptograp...
Cryptographic algorithms, protocols, and applications are difficult to implement correctly, and erro...
PLCrypto is the first ST-based cryptographic library that is executable on commercial off-the-shelf ...
Programmable Logic Controllers (PLCs) are control devices widely used in industrial automation. They...
Programmable Logic Controllers (PLCs) are control devices widely used in industrial automation. They...
Abstract. Secure Multi-party Computation (SMC) enables secure dis-tributed computation of arbitrary ...
This book focuses on protocols and constructions that make good use of symmetric pseudo random funct...
Programmable Logic Controllers (PLCs) are a family of embedded devices used for physical process con...
We provide an overview of selected crypto-hardware devices, with a special reference to the lightwei...
Power-line communications (PLC) use publicly accessible power-lines for the transmission of data. Th...
Includes bibliographical references (pages 89)CRYPTO is a computer-aided laboratory for cryptographi...
The paper presents an overview of recent developments in the design of cryptographic algorithms. A s...
Digital Signal Processing (DSP) has become part of many electronic applications these days; confluen...
This paper is an introduction to cryptography. It covers secretkey message-authentication codes, unp...
In order to check the applicability and correctness of any designed algorithm, it is must to write a...
Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptograp...
Cryptographic algorithms, protocols, and applications are difficult to implement correctly, and erro...