Results 1 - 10
of
318
The RC5 Encryption Algorithm
, 1995
"... Abstract. This document describes the RC5 encryption algorithm. RC5 is a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data-dependent rotations. RC5 has a variable word size, a variable number of rounds, and a variable-lengt ..."
Abstract
-
Cited by 363 (7 self)
- Add to MetaCart
, depending on the choice of parameters w and r. We summarize these parameters below: w This is the word size, in bits � each word contains u =(w=8) 8-bit bytes. The standard value of w is 32 bits � allowable values of w are 16, 32, and 64. RC5 encrypts two-word blocks: plaintext and ciphertext blocks
Full TCP/IP for 8-Bit Architectures
, 2003
"... We describe two small and portable TCP/IP implementations fulfilling the subset of RFC1122 requirements needed for full host-to-host interoperability. Our TCP/IP implementations do not sacrifice any of TCP's mechanisms such as urgent data or congestion control. They support IP fragment reassemb ..."
Abstract
-
Cited by 144 (17 self)
- Add to MetaCart
is on the order of 10 kilobytes and RAM usage can be configured to be as low as a few hundred bytes.
Improved cryptanalysis of an AES implementation
- In Proceedings of the 33rd WIC Symposium on Information Theory in the Benelux, Boekelo, The Netherlands
, 2012
"... In [1], Chow et al. provide an implementation of AES as a series of lookups in key-dependent tables. The tables depend not only on a key, but also on randomly chosen permutations of the set of 8-bits bytes. The idea is that many pairs of keys and permutations may give rise to the same table, thus ob ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
In [1], Chow et al. provide an implementation of AES as a series of lookups in key-dependent tables. The tables depend not only on a key, but also on randomly chosen permutations of the set of 8-bits bytes. The idea is that many pairs of keys and permutations may give rise to the same table, thus
with 20K Bytes Flash
"... The AT89C55WD is a low-power, high-performance CMOS 8-bit microcontroller with 20K bytes of Flash programmable read only memory and 256 bytes of RAM. The device is manufactured using Atmel’s high-density nonvolatile memory technology and is compatible with the industry standard 80C51 and 80C52 instr ..."
Abstract
- Add to MetaCart
The AT89C55WD is a low-power, high-performance CMOS 8-bit microcontroller with 20K bytes of Flash programmable read only memory and 256 bytes of RAM. The device is manufactured using Atmel’s high-density nonvolatile memory technology and is compatible with the industry standard 80C51 and 80C52
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
- Fast Software Encryption, Cambridge Security Workshop Proceedings
, 1994
"... : A new non-proprietary secret-key block-enciphering algorithm, SAFER K64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) is described. The blocklength is 64 bits (8 bytes) and only byte operationsareati in the processes of encryption and decryption. New cryptographic features ..."
Abstract
-
Cited by 58 (0 self)
- Add to MetaCart
: A new non-proprietary secret-key block-enciphering algorithm, SAFER K64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) is described. The blocklength is 64 bits (8 bytes) and only byte operationsareati in the processes of encryption and decryption. New cryptographic features
The Byte-oriented Substitution Permutation Network
"... Abstract — In this paper, we investigate the application of inte-gral cryptanalysis to the Byte-oriented Substitution Permutation Network (BSPN) block cipher. The BSPN block cipher has been shown to be an efficient block cipher structure, particularly for environments using 8-bit microcontrollers. I ..."
Abstract
- Add to MetaCart
Abstract — In this paper, we investigate the application of inte-gral cryptanalysis to the Byte-oriented Substitution Permutation Network (BSPN) block cipher. The BSPN block cipher has been shown to be an efficient block cipher structure, particularly for environments using 8-bit microcontrollers
8-bit AVR Microcontroller with 2K Bytes In-System Programmable Flash
"... ? 112 powerful instructions – most single clock cycle execution? 16 x 8 general purpose working registers? Fully static operation? Up to 12 MIPS throughput at 12MHz? Non-volatile program and data memories? 2K bytes of in-system programmable flash program memory? 128 bytes internal SRAM? Flash write/ ..."
Abstract
- Add to MetaCart
? 112 powerful instructions – most single clock cycle execution? 16 x 8 general purpose working registers? Fully static operation? Up to 12 MIPS throughput at 12MHz? Non-volatile program and data memories? 2K bytes of in-system programmable flash program memory? 128 bytes internal SRAM? Flash write
Standardizing Information and Communication Systems 8-Bit Single-Byte Coded Graphic Character Sets: Latin/Cyrillic Alphabet
, 1999
"... The adoption of ECMA-6 (ISO/IEC 646) as the agreed international 7-bit code for information interchange had led to the development of many national, international and application-oriented versions of this code. These versions had a number of limitations generally inherent to the size of the code: th ..."
Abstract
- Add to MetaCart
limited to the 82 common graphic characters. With the advent of 8-bit coding it was possible to increase the number of graphic characters. ISO/IEC 6937, for example, provided a character set covering the requirements of most languages based on the Latin alphabet. This character set, although well suited
Standardizing Information and Communication Systems 8-Bit Single-Byte Coded Graphic Character sets:
, 2000
"... The adoption of Standard ECMA-6 (ISO 646) in 1965 as the agreed international 7-bit code for information interchange has led to the development of many national, international and application-oriented versions of this code which have been in wide use for quite some time. These versions had a number ..."
Abstract
- Add to MetaCart
, interchange among different versions was practically limited to the 82 common graphic characters. With the advent of 8-bit coding it was possible to increase the number of graphic characters. ISO 6937/2, for example, provided a character set covering the requirements of most languages based on the Latin
8-Bit Single-Byte Coded Graphic Character Sets Latin/Arabic Alphabet Brief History
, 2000
"... The adoption of Standard ECMA-6 (ISO 646) in 1965 as the agreed international 7-bit code for information interchange has led to the development of many national, international and application-oriented versions of this code which have been in wide use for quite some time. These versions had a number ..."
Abstract
- Add to MetaCart
, − interchange among different versions was practically limited to the 82 common graphic characters. With the advent of 8-bit coding it was possible to increase the number of graphic characters. ISO 6937/2, for example, provided a character set covering the requirements of most languages based on the Latin
Results 1 - 10
of
318