Results 1 - 10
of
1,130
The RC5 Encryption Algorithm
, 1995
"... Abstract. This document describes the RC5 encryption algorithm. RC5 is a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data-dependent rotations. RC5 has a variable word size, a variable number of rounds, and a variable-lengt ..."
Abstract
-
Cited by 363 (7 self)
- Add to MetaCart
Abstract. This document describes the RC5 encryption algorithm. RC5 is a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data-dependent rotations. RC5 has a variable word size, a variable number of rounds, and a variable
A Concrete Security Treatment of Symmetric Encryption
- Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE
, 1997
"... We study notions and schemes for symmetric (ie. private key) encryption in a concrete security framework. We give four di erent notions of security against chosen plaintext attack and analyze the concrete complexity ofreductions among them, providing both upper and lower bounds, and obtaining tight ..."
Abstract
-
Cited by 421 (65 self)
- Add to MetaCart
relations. In this way we classify notions (even though polynomially reducible to each other) as stronger or weaker in terms of concrete security. Next we provide concrete security analyses of methods to encrypt using a block cipher, including the most popular encryption method, CBC. We establish tight
PRESENT: An Ultra-Lightweight Block Cipher
- THE PROCEEDINGS OF CHES 2007
, 2007
"... With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher applications the AES is an excellent and preferred choice. However, despite recent implementation advances, the AES is not suitable for extremely constrained environments such ..."
Abstract
-
Cited by 167 (19 self)
- Add to MetaCart
With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher applications the AES is an excellent and preferred choice. However, despite recent implementation advances, the AES is not suitable for extremely constrained environments
The RC5 Encryption Algorithm
, 1995
"... . This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data-dependent rotations. RC5 has a variable word size, a variable number of rounds, and a variable-length secret key. T ..."
Abstract
- Add to MetaCart
. This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data-dependent rotations. RC5 has a variable word size, a variable number of rounds, and a variable-length secret key
The block cipher SC2000
- In Preproceedings of FSE 2001
, 2001
"... Abstract. In this paper, we propose a new symmetric key block cipher SC2000 with 128-bit block length and 128-,192-,256-bit key lengths. The block cipher is constructed by piling two layers: one is a Feistel structure layer and the other is an SPN structure layer. Each operation used in two layers i ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Abstract. In this paper, we propose a new symmetric key block cipher SC2000 with 128-bit block length and 128-,192-,256-bit key lengths. The block cipher is constructed by piling two layers: one is a Feistel structure layer and the other is an SPN structure layer. Each operation used in two layers
Symmetric Block Ciphers
"... ◦ The same key K is used for enciphering and deciphering of messages: Plain-text ..."
Abstract
- Add to MetaCart
◦ The same key K is used for enciphering and deciphering of messages: Plain-text
On the Cryptographic Strength of Symmetric Ciphers Suitable for Power-Line Communications Abstract
"... Power-line communications (PLC) use publicly accessible power-lines for the transmission of data. The powerline should be viewed as a hostile channel requiring special security services, if secure communication is desired. This paper introduces cryptography and related services. The operation and ch ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
and characteristics of some symmetric block ciphers for PLC use are reviewed. These characteristics include security, speed and flexibility. Exhaustive key search is suggested as a first yardstick for the security of ciphers and a minimal key length to provide adequate security is proposed. Differential and linear
Cipher
"... Abstract---The “PYRAMIDS ” Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit length, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of a simple round transformation with different operations and d ..."
Abstract
- Add to MetaCart
Abstract---The “PYRAMIDS ” Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit length, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of a simple round transformation with different operations
Decorrelated Fast Cipher: an AES Candidate
, 1998
"... . This report presents a response to the call for candidates issued by the National Institute for Standards and Technologies (the Advanced Encryption Standard project). The proposed candidate --- called DFC as for "Decorrelated Fast Cipher" --- is based on Vaudenay's decorrelation tec ..."
Abstract
-
Cited by 9 (2 self)
- Add to MetaCart
technique. This provides provable security against several classes of attacks which include the basic version of Biham and Shamir's Differential Cryptanalysis as well as Matsui's Linear Cryptanalysis. Since the beginning of commercial use of symmetric encryption through block ciphers
HIGHT: A New Block Cipher Suitable for Low-Resource Device
, 2009
"... In this paper, we propose a new block cipher HIGHT with 64-bit block length and 128-bit key length. It provides low-resource hardware implementation, which is proper to ubiquitous computing device such as a sensor in USN or a RFID tag. HIGHT does not only consist of simple operations to be ultra-li ..."
Abstract
-
Cited by 64 (1 self)
- Add to MetaCart
In this paper, we propose a new block cipher HIGHT with 64-bit block length and 128-bit key length. It provides low-resource hardware implementation, which is proper to ubiquitous computing device such as a sensor in USN or a RFID tag. HIGHT does not only consist of simple operations to be ultra
Results 1 - 10
of
1,130