• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,130
Next 10 →

The RC5 Encryption Algorithm

by Ronald L. Rivest , 1995
"... Abstract. This document describes the RC5 encryption algorithm. RC5 is a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data-dependent rotations. RC5 has a variable word size, a variable number of rounds, and a variable-lengt ..."
Abstract - Cited by 363 (7 self) - Add to MetaCart
Abstract. This document describes the RC5 encryption algorithm. RC5 is a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data-dependent rotations. RC5 has a variable word size, a variable number of rounds, and a variable

A Concrete Security Treatment of Symmetric Encryption

by M. Bellare, A. Desai, E. Jokipii, P. Rogaway - Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE , 1997
"... We study notions and schemes for symmetric (ie. private key) encryption in a concrete security framework. We give four di erent notions of security against chosen plaintext attack and analyze the concrete complexity ofreductions among them, providing both upper and lower bounds, and obtaining tight ..."
Abstract - Cited by 421 (65 self) - Add to MetaCart
relations. In this way we classify notions (even though polynomially reducible to each other) as stronger or weaker in terms of concrete security. Next we provide concrete security analyses of methods to encrypt using a block cipher, including the most popular encryption method, CBC. We establish tight

PRESENT: An Ultra-Lightweight Block Cipher

by A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, C. Vikkelsoe - THE PROCEEDINGS OF CHES 2007 , 2007
"... With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher applications the AES is an excellent and preferred choice. However, despite recent implementation advances, the AES is not suitable for extremely constrained environments such ..."
Abstract - Cited by 167 (19 self) - Add to MetaCart
With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher applications the AES is an excellent and preferred choice. However, despite recent implementation advances, the AES is not suitable for extremely constrained environments

The RC5 Encryption Algorithm

by Ronald Rivest Mit, Ronald L. Rivest , 1995
"... . This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data-dependent rotations. RC5 has a variable word size, a variable number of rounds, and a variable-length secret key. T ..."
Abstract - Add to MetaCart
. This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of data-dependent rotations. RC5 has a variable word size, a variable number of rounds, and a variable-length secret key

The block cipher SC2000

by Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii - In Preproceedings of FSE 2001 , 2001
"... Abstract. In this paper, we propose a new symmetric key block cipher SC2000 with 128-bit block length and 128-,192-,256-bit key lengths. The block cipher is constructed by piling two layers: one is a Feistel structure layer and the other is an SPN structure layer. Each operation used in two layers i ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Abstract. In this paper, we propose a new symmetric key block cipher SC2000 with 128-bit block length and 128-,192-,256-bit key lengths. The block cipher is constructed by piling two layers: one is a Feistel structure layer and the other is an SPN structure layer. Each operation used in two layers

Symmetric Block Ciphers

by Arno Wacker, Arno Wackerdistributed Systems
"... ◦ The same key K is used for enciphering and deciphering of messages: Plain-text ..."
Abstract - Add to MetaCart
◦ The same key K is used for enciphering and deciphering of messages: Plain-text

On the Cryptographic Strength of Symmetric Ciphers Suitable for Power-Line Communications Abstract

by Reiner Dojen, Tom Coffey
"... Power-line communications (PLC) use publicly accessible power-lines for the transmission of data. The powerline should be viewed as a hostile channel requiring special security services, if secure communication is desired. This paper introduces cryptography and related services. The operation and ch ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
and characteristics of some symmetric block ciphers for PLC use are reviewed. These characteristics include security, speed and flexibility. Exhaustive key search is suggested as a first yardstick for the security of ciphers and a minimal key length to provide adequate security is proposed. Differential and linear

Cipher

by A. Alkalbany, H. Al Hassan, M. Saeb
"... Abstract---The “PYRAMIDS ” Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit length, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of a simple round transformation with different operations and d ..."
Abstract - Add to MetaCart
Abstract---The “PYRAMIDS ” Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit length, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of a simple round transformation with different operations

Decorrelated Fast Cipher: an AES Candidate

by Henri Gilbert, Marc Girault, Philippe Hoogvorst, Fabrice Noilhan, Thomas Pornin, Guillaume Poupard, Jacques Stern, Serge Vaudenay , 1998
"... . This report presents a response to the call for candidates issued by the National Institute for Standards and Technologies (the Advanced Encryption Standard project). The proposed candidate --- called DFC as for "Decorrelated Fast Cipher" --- is based on Vaudenay's decorrelation tec ..."
Abstract - Cited by 9 (2 self) - Add to MetaCart
technique. This provides provable security against several classes of attacks which include the basic version of Biham and Shamir's Differential Cryptanalysis as well as Matsui's Linear Cryptanalysis. Since the beginning of commercial use of symmetric encryption through block ciphers

HIGHT: A New Block Cipher Suitable for Low-Resource Device

by Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bon-seok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Hyun Kim, Jongsung Kim, Seongtaek Chee, et al. , 2009
"... In this paper, we propose a new block cipher HIGHT with 64-bit block length and 128-bit key length. It provides low-resource hardware implementation, which is proper to ubiquitous computing device such as a sensor in USN or a RFID tag. HIGHT does not only consist of simple operations to be ultra-li ..."
Abstract - Cited by 64 (1 self) - Add to MetaCart
In this paper, we propose a new block cipher HIGHT with 64-bit block length and 128-bit key length. It provides low-resource hardware implementation, which is proper to ubiquitous computing device such as a sensor in USN or a RFID tag. HIGHT does not only consist of simple operations to be ultra
Next 10 →
Results 1 - 10 of 1,130
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University