메뉴 건너뛰기




Volumn 32, Issue 2-3, 2006, Pages 149-163

Controlled elements for designing ciphers suitable to efficient VLSI implementation

Author keywords

Block ciphers; Data dependent operations; Hardware implementation; Security

Indexed keywords

MATHEMATICAL TRANSFORMATIONS; PERFORMANCE; STANDARDS; THROUGHPUT; VLSI CIRCUITS;

EID: 33746643471     PISSN: 10184864     EISSN: 15729451     Source Type: Journal    
DOI: 10.1007/s11235-006-9135-5     Document Type: Conference Paper
Times cited : (13)

References (24)
  • 1
    • 0000648555 scopus 로고
    • Permutation network
    • A.A. Waksman, Permutation Network, Journal of the. ACM 15 (1968) 159-163.
    • (1968) Journal of The. ACM , vol.15 , pp. 159-163
    • Waksman, A.A.1
  • 2
    • 0018995782 scopus 로고
    • Notes on shuffle/exchange-type switching networks
    • D.S. Parker, Notes on shuffle/exchange-type switching networks, IEEE Transactions on computers C-29(3) (1980) 213-222.
    • (1980) IEEE Transactions on Computers , vol.C-29 , Issue.3 , pp. 213-222
    • Parker, D.S.1
  • 3
    • 17444431022 scopus 로고
    • A generallized description of DBS-based and Benes-based permutation generators
    • M. Portz, A generallized description of DBS-based and Benes-based permutation generators, Springer-Verlag LNCS 718 (1992) 397-409.
    • (1992) Springer-verlag LNCS , vol.718 , pp. 397-409
    • Portz, M.1
  • 4
    • 33746654138 scopus 로고    scopus 로고
    • The design of the ICE encryption algorithm
    • M. Kwan, The design of the ICE encryption algorithm, Springer-Verlag LNCS 1267 (1997) 69-82.
    • (1997) Springer-verlag LNCS , vol.1267 , pp. 69-82
    • Kwan, M.1
  • 5
    • 84947907850 scopus 로고    scopus 로고
    • Differential cryptanalysis of the ICE encryption algorithm
    • B. Van Rompay, L.R. Knudsen, and V. Rijmen, Differential cryptanalysis of the ICE encryption algorithm, Springer-Verlag LNCS 1372 (1998) 270-283.
    • (1998) Springer-verlag LNCS , vol.1372 , pp. 270-283
    • Van Rompay, B.1    Knudsen, L.R.2    Rijmen, V.3
  • 6
    • 84948990100 scopus 로고
    • The RC5 encryption algorithm
    • R.L. Rivest, The RC5 Encryption Algorithm, Springer-Verlag LNCS 1008 (1995) 86-96.
    • (1995) Springer-verlag LNCS , vol.1008 , pp. 86-96
    • Rivest, R.L.1
  • 10
    • 0141755484 scopus 로고    scopus 로고
    • A cipher based on data-dependent permutations
    • A.A. Moldovyan and N. A. Moldovyan, A cipher based on data-dependent permutations, Journal of Cryptology 15 (2002) 61-72.
    • (2002) Journal of Cryptology , vol.15 , pp. 61-72
    • Moldovyan, A.A.1    Moldovyan, N.A.2
  • 12
    • 33746628073 scopus 로고    scopus 로고
    • Fast DDP-based ciphers: Design and differential analysis of cobra-H64
    • N.A. Moldovyan, Fast DDP-Based Ciphers: Design and Differential Analysis of Cobra-H64, Computer Science Journal of Moldova 11(3) (2003) 292-315.
    • (2003) Computer Science Journal of Moldova , vol.11 , Issue.3 , pp. 292-315
    • Moldovyan, N.A.1
  • 13
    • 17444420720 scopus 로고    scopus 로고
    • High speed networking security: Design and implementation of two new DDP-based ciphers
    • N. Sklavos, N.A. Moldovyan, O. Koufopavlou, High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers, Mobile Networks and Applications 10 (2005) 237-249.
    • (2005) Mobile Networks and Applications , vol.10 , pp. 237-249
    • Sklavos, N.1    Moldovyan, N.A.2    Koufopavlou, O.3
  • 15
    • 0035517885 scopus 로고    scopus 로고
    • Efficient permutation instructions for Fast Software Cryptography
    • R.B. Lee, Z.J. Shi, and X. Yang, Efficient permutation instructions for Fast Software Cryptography, IEEE Micro 21(6) (2001) 56-69.
    • (2001) IEEE Micro , vol.21 , Issue.6 , pp. 56-69
    • Lee, R.B.1    Shi, Z.J.2    Yang, X.3
  • 19
    • 84944063721 scopus 로고    scopus 로고
    • A chosen plaintext linear attack on block cipher CIKS-1
    • Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, and Jongin Lim, A chosen plaintext linear attack on block cipher CIKS-1, Springer-Verlag LNCS 2513 (2003) 456-468.
    • (2003) Springer-verlag LNCS , vol.2513 , pp. 456-468
    • Lee, C.1    Hong, D.2    Lee, S.3    Lee, S.4    Yang, H.5    Lim, J.6
  • 21
    • 33646847104 scopus 로고    scopus 로고
    • Linear cryptanalysis on SPECTR-H64 with higher order differential property
    • Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, and Jongin Lim, Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property, Springer Verlag LNCS 2776 (2003) 298-307.
    • (2003) Springer Verlag LNCS , vol.2776 , pp. 298-307
    • Ko, Y.1    Hong, D.2    Hong, S.3    Lee, S.4    Lim, J.5
  • 22
    • 33746592849 scopus 로고    scopus 로고
    • On cipher design based on switchable controlled operations
    • N.A. Moldovyan, On Cipher Design Based on Switchable Controlled Operations, Springer-Verlag LNCS 2776 (2003) 316-327.
    • (2003) Springer-verlag LNCS , vol.2776 , pp. 316-327
    • Moldovyan, N.A.1
  • 23
    • 33746646338 scopus 로고    scopus 로고
    • Encryption and data dependent permutations: Implementation cost and performance evaluation
    • N. Sklavos, A.A. Moldovyan, and O. Koufopavlou, Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation, Springer-Verlag LNCS 2776 (2003) 337-348.
    • (2003) Springer-verlag LNCS , vol.2776 , pp. 337-348
    • Sklavos, N.1    Moldovyan, A.A.2    Koufopavlou, O.3
  • 24
    • 0004512317 scopus 로고    scopus 로고
    • An FPGA implementation and performance evaluation of the AES block cipher candidate algorithm finalists
    • New York, NY, USA (April 13-14)
    • A. J. Elbirt, W. Yip, B. Ghetwynd, and C. Paar, An FPGA Implementation and Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists, 3rd Advanced Encryption Standard Conference Proceedings, New York, NY, USA (http://www.nist.gov/aes) (April 13-14, 2000).
    • (2000) 3rd Advanced Encryption Standard Conference Proceedings
    • Elbirt, A.J.1    Yip, W.2    Ghetwynd, B.3    Paar, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.