-
1
-
-
80053509413
-
-
Mangard and Standaert [23]
-
Aumasson, J.P., Henzen, L., Meier, W., Naya-Plasencia, M.: Quark: A lightweight hash. In: Mangard and Standaert [23], pp. 1-15
-
Quark: A Lightweight Hash
, pp. 1-15
-
-
Aumasson, J.P.1
Henzen, L.2
Meier, W.3
Naya-Plasencia, M.4
-
3
-
-
44449147491
-
On the Indifferentiability of the Sponge Construction
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: On the Indifferentiability of the Sponge Construction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 181-197. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 181-197
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Assche, G.V.4
-
4
-
-
80053470110
-
-
Mangard and Standaert [23]
-
Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Sponge-Based Pseudo-Random Number Generators. In: Mangard and Standaert [23], pp. 33-47
-
Sponge-Based Pseudo-Random Number Generators
, pp. 33-47
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Assche, G.V.4
-
5
-
-
37149045263
-
PRESENT: An Ultra-Lightweight Block Cipher
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450-466. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 450-466
-
-
Bogdanov, A.1
Knudsen, L.R.2
Leander, G.3
Paar, C.4
Poschmann, A.5
Robshaw, M.J.B.6
Seurin, Y.7
Vikkelsoe, C.8
-
6
-
-
51049092732
-
Hash Functions and RFID Tags: Mind the Gap
-
Oswald, E., Rohatgi, P. (eds.) CHES 2008. Springer, Heidelberg
-
Bogdanov, A., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y.: Hash Functions and RFID Tags: Mind the Gap. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 283-299. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5154
, pp. 283-299
-
-
Bogdanov, A.1
Leander, G.2
Paar, C.3
Poschmann, A.4
Robshaw, M.J.B.5
Seurin, Y.6
-
7
-
-
77952047730
-
Linear Cryptanalysis of Reduced-Round PRESENT
-
Pieprzyk, J. (ed.) CT-RSA 2010. Springer, Heidelberg
-
Cho, J.Y.: Linear Cryptanalysis of Reduced-Round PRESENT. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 302-317. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5985
, pp. 302-317
-
-
Cho, J.Y.1
-
8
-
-
67650119051
-
A Statistical Saturation Attack against the Block Cipher PRESENT
-
Fischlin, M. (ed.) CT-RSA 2009. Springer, Heidelberg
-
Collard, B., Standaert, F.-X.: A Statistical Saturation Attack against the Block Cipher PRESENT. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 195-210. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5473
, pp. 195-210
-
-
Collard, B.1
Standaert, F.-X.2
-
10
-
-
33750241980
-
Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
-
Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. Springer, Heidelberg
-
De Cannière, C.: Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 171-186. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4176
, pp. 171-186
-
-
De Cannière, C.1
-
11
-
-
70350589237
-
KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers
-
Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
-
De Cannière, C., Dunkelman, O., Knežević, M.: KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272-288. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5747
, pp. 272-288
-
-
De Cannière, C.1
Dunkelman, O.2
Knežević, M.3
-
13
-
-
48249107434
-
-
Robshaw and Billet [25]
-
Hell, M., Johansson, T., Maximov, A., Meier, W.: The Grain Family of Stream Ciphers. In: Robshaw and Billet [25], pp. 179-190
-
The Grain Family of Stream Ciphers
, pp. 179-190
-
-
Hell, M.1
Johansson, T.2
Maximov, A.3
Meier, W.4
-
14
-
-
84886703527
-
Grain: A stream cipher for constrained environments
-
Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. IJWMC 2(1), 86-93 (2007)
-
(2007)
IJWMC
, vol.2
, Issue.1
, pp. 86-93
-
-
Hell, M.1
Johansson, T.2
Meier, W.3
-
15
-
-
80053543053
-
-
Henzen, L., Aumasson, J.P., Meier, W., Phan, R.C.W.: LSI Characterization of the Cryptographic Hash Function BLAKE (2010), http://131002.net/data/papers/ HAMP10.pdf
-
(2010)
LSI Characterization of the Cryptographic Hash Function BLAKE
-
-
Henzen, L.1
Aumasson, J.P.2
Meier, W.3
Phan, R.C.W.4
-
16
-
-
33750699594
-
HIGHT: A new block cipher suitable for low-resource device
-
Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings
-
Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J., Chee, S.: HIGHT: A New Block Cipher Suitable for Low-Resource Device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46-59. Springer, Heidelberg (2006) (Pubitemid 44700048)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4249 LNCS
, pp. 46-59
-
-
Hong, D.1
Sung, J.2
Hong, S.3
Lim, J.4
Lee, S.5
Koo, B.-S.6
Lee, C.7
Chang, D.8
Lee, J.9
Jeong, K.10
Kim, H.11
Kim, J.12
Chee, S.13
-
17
-
-
78650114205
-
A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications
-
Ors Yalcin, S.B. (ed.) RFIDSec 2010. Springer, Heidelberg
-
Kavun, E., Yalcin, T.: A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 258-269. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6370
, pp. 258-269
-
-
Kavun, E.1
Yalcin, T.2
-
18
-
-
38149136484
-
Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing
-
Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. Springer, Heidelberg
-
Kim, M., Ryou, J.: Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 375-385. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4861
, pp. 375-385
-
-
Kim, M.1
Ryou, J.2
-
19
-
-
67650146012
-
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing
-
Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. Springer, Heidelberg
-
Kim, M., Ryou, J., Jun, S.: Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. In: Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. LNCS, vol. 5487, pp. 240-252. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5487
, pp. 240-252
-
-
Kim, M.1
Ryou, J.2
Jun, S.3
-
21
-
-
37149033689
-
New Lightweight des Variants
-
Biryukov, A. (ed.) FSE 2007. Springer, Heidelberg
-
Leander, G., Paar, C., Poschmann, A., Schramm, K.: New Lightweight DES Variants. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 196-210. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4593
, pp. 196-210
-
-
Leander, G.1
Paar, C.2
Poschmann, A.3
Schramm, K.4
-
22
-
-
33744929155
-
MCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors
-
Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. Springer, Heidelberg
-
Lim, C.H., Korkishko, T.: mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 243-258. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3786
, pp. 243-258
-
-
Lim, C.H.1
Korkishko, T.2
-
23
-
-
80053484578
-
CHES 2010
-
Springer, Heidelberg
-
Mangard, S., Standaert, F.-X. (eds.): CHES 2010. LNCS, vol. 6225. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6225
-
-
Mangard, S.1
Standaert, F.-X.2
-
24
-
-
70350398631
-
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl
-
Dunkelman, O. (ed.) FSE 2009. Springer, Heidelberg
-
Mendel, F., Rechberger, C., Schläffer, M., Thomsen, S.S.: The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 260-276. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5665
, pp. 260-276
-
-
Mendel, F.1
Rechberger, C.2
Schläffer, M.3
Thomsen, S.S.4
-
25
-
-
76549118066
-
New Stream Cipher Designs
-
Springer, Heidelberg
-
Robshaw, M.J.B., Billet, O. (eds.): New Stream Cipher Designs. LNCS, vol. 4986. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4986
-
-
Robshaw, M.J.B.1
Billet, O.2
-
26
-
-
84884882198
-
SEA: A Scalable Encryption Algorithm for Small Embedded Applications
-
Presented at the
-
Standaert, F.X., Piret, G., Gershenfeld, N., Quisquater, J.J.: SEA: A Scalable Encryption Algorithm for Small Embedded Applications. Presented at the Workshop on RFID and Light-Weight Crypto in Graz, Austria (2005)
-
Workshop on RFID and Light-Weight Crypto in Graz, Austria (2005)
-
-
Standaert, F.X.1
Piret, G.2
Gershenfeld, N.3
Quisquater, J.J.4
-
27
-
-
77955992551
-
-
Cryptology ePrint Archive, Report 2009/349
-
Tillich, S., Feldhofer, M., Issovits, W., Kern, T., Kureck, H., Mühlberghuber, M., Neubauer, G., Reiter, A., Köfler, A., Mayrhofer, M.: Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Grøstl, and Skein. Cryptology ePrint Archive, Report 2009/349 (2009), http://eprint.iacr.org/2009/349
-
(2009)
Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Grøstl, and Skein
-
-
Tillich, S.1
Feldhofer, M.2
Issovits, W.3
Kern, T.4
Kureck, H.5
Mühlberghuber, M.6
Neubauer, G.7
Reiter, A.8
Köfler, A.9
Mayrhofer, M.10
-
28
-
-
18144420462
-
Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard
-
Yang, B., Wu, K., Karri, R.: Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard. In: International Test Conference, pp. 339-344 (2004)
-
(2004)
International Test Conference
, pp. 339-344
-
-
Yang, B.1
Wu, K.2
Karri, R.3
|