-
2
-
-
84857184529
-
Grain-128a: A new version of Grain-128 with optional authentication
-
Ågren, M., Hell, M., Johansson, T., Meier, W.: Grain-128a: a new version of Grain-128 with optional authentication. IJWMC 5(1), 48-59 (2011)
-
(2011)
IJWMC
, vol.5
, Issue.1
, pp. 48-59
-
-
Ågren, M.1
Hell, M.2
Johansson, T.3
Meier, W.4
-
3
-
-
78651107729
-
Breakthrough AES Performance with Intel AES New Instructions
-
January
-
Akdemir, K., Dixon, M., Feghali, W., Fay, P., Gopal, V., Guilford, J., Erdinc Ozturk, G.W., Zohar, R.: Breakthrough AES Performance with Intel AES New Instructions. Intel white paper, January 2010
-
(2010)
Intel White Paper
-
-
Akdemir, K.1
Dixon, M.2
Feghali, W.3
Fay, P.4
Gopal, V.5
Guilford, J.6
Erdinc Ozturk, G.W.7
Zohar, R.8
-
4
-
-
78049351742
-
Quark: A lightweight hash
-
Mangard, S., Standaert, F.-X. (eds.) CHES 2010. Springer, Heidelberg
-
Aumasson, J.-P., Henzen, L., Meier, W., Naya-Plasencia, M.: Quark: a lightweight hash. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 1-15. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6225
, pp. 1-15
-
-
Aumasson, J.-P.1
Henzen, L.2
Meier, W.3
Naya-Plasencia, M.4
-
6
-
-
44449147491
-
On the indifferentiability of the sponge construction
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: On the indifferentiability of the sponge construction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 181-197. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 181-197
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
7
-
-
84855354856
-
-
Submission to NIST (Round 3), January
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak reference. Submission to NIST (Round 3), January 2011. http://keccak.noekeon.org
-
(2011)
The Keccak Reference
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
9
-
-
80053502266
-
Spongent: A lightweight hash function
-
Preneel, B., Takagi, T. (eds.) CHES 2011. Springer, Heidelberg
-
Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varici, K., Verbauwhede, I.: Spongent: a lightweight hash function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312-325. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6917
, pp. 312-325
-
-
Bogdanov, A.1
Knežević, M.2
Leander, G.3
Toz, D.4
Varici, K.5
Verbauwhede, I.6
-
10
-
-
37149045263
-
PRESENT: An ultra-lightweight block cipher
-
Paillier, P., Verbauwhede, I. (eds.) CHES 2007. Springer, Heidelberg
-
Bogdanov, A.A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450-466. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4727
, pp. 450-466
-
-
Bogdanov, A.A.1
Knudsen, L.R.2
Leander, G.3
Paar, C.4
Poschmann, A.5
Robshaw, M.6
Seurin, Y.7
Vikkelsoe, C.8
-
11
-
-
80051979158
-
-
Rogaway [38]
-
Bouillaguet, C., Derbez, P., Fouque, P.A.: Automatic search of attacks on round-reduced AES and applications. In: Rogaway [38], pp. 169-187
-
Automatic Search of Attacks on Round-reduced AES and Applications
, pp. 169-187
-
-
Bouillaguet, C.1
Derbez, P.2
Fouque, P.A.3
-
12
-
-
27244440344
-
A very compact S-box for AES
-
Rao, J.R., Sunar, B. (eds.) CHES 2005. Springer, Heidelberg
-
Canright, D.: A very compact S-box for AES. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 441-455. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3659
, pp. 441-455
-
-
Canright, D.1
-
13
-
-
84946823597
-
The wide trail design strategy
-
Honary, B. (ed.) Cryptography and Coding 2001. Springer, Heidelberg
-
Daemen, J., Rijmen, V.: The wide trail design strategy. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 222-238. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2260
, pp. 222-238
-
-
Daemen, J.1
Rijmen, V.2
-
15
-
-
77957142106
-
Refinements of the ALRED construction and MAC security claims
-
Daemen, J., Rijmen, V.: Refinements of the ALRED construction and MAC security claims. IET Inf. Secur. 4(3), 149-157 (2010)
-
(2010)
IET Inf. Secur.
, vol.4
, Issue.3
, pp. 149-157
-
-
Daemen, J.1
Rijmen, V.2
-
16
-
-
70350589237
-
KATAN and KTANTAN - A family of small and efficient hardware-oriented block ciphers
-
Clavier, Ch., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
-
De Cannière, C., Dunkelman, O., Knežević, M.: KATAN and KTANTAN - a family of small and efficient hardware-oriented block ciphers. In: Clavier, Ch., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272-288. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5747
, pp. 272-288
-
-
De Cannière, C.1
Dunkelman, O.2
Knežević, M.3
-
18
-
-
58349113066
-
An improved impossible differential attack on MISTY1
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Dunkelman, O., Keller, N.: An improved impossible differential attack on MISTY1. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 441-454. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 441-454
-
-
Dunkelman, O.1
Keller, N.2
-
21
-
-
84856112196
-
The Hummingbird-2 lightweight authenticated encryption algorithm
-
Juels, A., Paar, C. (eds.) RFIDSec 2011. Springer, Heidelberg
-
Engels, D., Saarinen, M.-J.O., Schweitzer, P., Smith, E.M.: The Hummingbird-2 lightweight authenticated encryption algorithm. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 19-31. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7055
, pp. 19-31
-
-
Engels, D.1
Saarinen, M.-J.O.2
Schweitzer, P.3
Smith, E.M.4
-
22
-
-
58349119300
-
A note on distinguishing attacks
-
Englund, H., Hell, M., Johansson, T.: A note on distinguishing attacks. In: Preproceedings of State of the Art of Stream Ciphers workshop (SASC 2007), Bochum, Germany, pp. 73-78 (2007)
-
(2007)
Preproceedings of State of the Art of Stream Ciphers Workshop (SASC 2007), Bochum, Germany
, pp. 73-78
-
-
Englund, H.1
Hell, M.2
Johansson, T.3
-
23
-
-
79952032787
-
Intel Advanced Encryption Standard (AES) Instructions Set
-
January
-
Gueron, S.: Intel Advanced Encryption Standard (AES) Instructions Set. Intel white paper, January 2010
-
(2010)
Intel White Paper
-
-
Gueron, S.1
-
24
-
-
80051991385
-
-
Rogaway [38]
-
Guo, J., Peyrin, T., Poschmann, A.: The PHOTON family of lightweight hash functions. In: Rogaway [38], pp. 222-239
-
The PHOTON Family of Lightweight Hash Functions
, pp. 222-239
-
-
Guo, J.1
Peyrin, T.2
Poschmann, A.3
-
25
-
-
48249107434
-
-
Robshaw and Billet [37]
-
Hell, M., Johansson, T., Maximov, A., Meier, W.: The Grain family of stream ciphers. In: Robshaw and Billet [37], pp. 179-190
-
The Grain Family of Stream Ciphers
, pp. 179-190
-
-
Hell, M.1
Johansson, T.2
Maximov, A.3
Meier, W.4
-
26
-
-
33750699594
-
HIGHT: A new block cipher suitable for low-resource device
-
Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings
-
Hong, D., Sung, J., Hong, S.H., Lim, J.-I., Lee, S.-J., Koo, B.-S., Lee, C.-H., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J.-S., Chee, S.: HIGHT: a new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46-59. Springer, Heidelberg (2006) (Pubitemid 44700048)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4249 LNCS
, pp. 46-59
-
-
Hong, D.1
Sung, J.2
Hong, S.3
Lim, J.4
Lee, S.5
Koo, B.-S.6
Lee, C.7
Chang, D.8
Lee, J.9
Jeong, K.10
Kim, H.11
Kim, J.12
Chee, S.13
-
27
-
-
84974712857
-
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure
-
Fast Software Encryption
-
Hong, S.H., Lee, S.-J., Lim, J.-I., Sung, J., Cheon, D.H., Cho, I.: Provable security against differential and linear cryptanalysis for the SPN structure. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 273-283. Springer, Heidelberg (2001) (Pubitemid 33236955)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1978
, pp. 273-283
-
-
Hong, S.1
Lee, S.2
Lim, J.3
Sung, J.4
Cheon, D.5
Cho, I.6
-
28
-
-
84857706080
-
ASC-1: An authenticated encryption stream cipher
-
Miri, A., Vaudenay, S. (eds.) SAC 2011. Springer, Heidelberg
-
Jakimoski, G., Khajuria, S.: ASC-1: an authenticated encryption stream cipher. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 356-372. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7118
, pp. 356-372
-
-
Jakimoski, G.1
Khajuria, S.2
-
29
-
-
78650114205
-
A lightweight implementation of Keccak hash function for radio-frequency identification applications
-
Ors Yalcin, S.B. (ed.) RFIDSec 2010. Springer, Heidelberg
-
Kavun, E.B., Yalcin, T.: A lightweight implementation of Keccak hash function for radio-frequency identification applications. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 258-269. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6370
, pp. 258-269
-
-
Kavun, E.B.1
Yalcin, T.2
-
30
-
-
37149033689
-
New lightweight DES variants
-
Biryukov, A. (ed.) FSE 2007. Springer, Heidelberg
-
Leander, G., Paar, C., Poschmann, A., Schramm, K.: New lightweight DES variants. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 196-210. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4593
, pp. 196-210
-
-
Leander, G.1
Paar, C.2
Poschmann, A.3
Schramm, K.4
-
31
-
-
33744929155
-
mCrypton - A lightweight block cipher for security of low-cost RFID tags and sensors
-
Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. Springer, Heidelberg
-
Lim, C.H., Korkishko, T.: mCrypton - a lightweight block cipher for security of low-cost RFID tags and sensors. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 243-258. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3786
, pp. 243-258
-
-
Lim, C.H.1
Korkishko, T.2
-
32
-
-
84866721223
-
Lightweight cryptography for the cloud: Exploit the power of bitslice implementation
-
Prouff, E., Schaumont, P. (eds.) CHES 2012. Springer, Heidelberg
-
Matsuda, S., Moriai, S.: Lightweight cryptography for the cloud: exploit the power of bitslice implementation. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 408-425. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7428
, pp. 408-425
-
-
Matsuda, S.1
Moriai, S.2
-
35
-
-
79958010336
-
Pushing the limits: A very compact and a threshold implementation of AES
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Moradi, A., Poschmann, A., Ling, S., Paar, C., Wang, H.: Pushing the limits: a very compact and a threshold implementation of AES. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 69-88. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 69-88
-
-
Moradi, A.1
Poschmann, A.2
Ling, S.3
Paar, C.4
Wang, H.5
-
36
-
-
84905391365
-
FSE 2006
-
Springer, Heidelberg
-
Robshaw, M. (ed.): FSE 2006. LNCS, vol. 4047. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4047
-
-
Robshaw, M.1
-
37
-
-
76549118066
-
New Stream Cipher Designs
-
Springer, Heidelberg
-
Robshaw, M., Billet, O. (eds.): New Stream Cipher Designs. LNCS, vol. 4986. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4986
-
-
Robshaw, M.1
Billet, O.2
-
38
-
-
84859478440
-
CRYPTO 2011
-
Springer, Heidelberg
-
Rogaway, P. (ed.): CRYPTO 2011. LNCS, vol. 6841. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
-
-
Rogaway, P.1
-
39
-
-
0035750947
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: a block-cipher mode of operation for efficient authenticated encryption. In: Reiter, M.K., Samarati, P. (eds.) Computer and Communications Security, pp. 196-205. ACM, New York (2001) (Pubitemid 34974720)
-
(2001)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 196-205
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
-
41
-
-
33745777809
-
SEA: A scalable encryption algorithm for small embedded applications
-
DOI 10.1007/11733447-16, Smart Card Research and Advanced Applications - 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Proceedings
-
Standaert, F.-X., Piret, G., Gershenfeld, N., Quisquater, J.-J.: SEA: a scalable encryption algorithm for small embedded applications. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol. 3928, pp. 222-236. Springer, Heidelberg (2006) (Pubitemid 44019872)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3928 LNCS
, pp. 222-236
-
-
Standaert, F.-X.1
Piret, G.2
Gershenfeld, N.3
Quisquater, J.-J.4
-
43
-
-
70350343382
-
New birthday attacks on some MACs based on block ciphers
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Yuan, Z., Wang, W., Jia, K., Xu, G., Wang, X.: New birthday attacks on some MACs based on block ciphers. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 209-230. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 209-230
-
-
Yuan, Z.1
Wang, W.2
Jia, K.3
Xu, G.4
Wang, X.5
|