State of the art in lightweight symmetric cryptography
A Biryukov, L Perrin - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Lightweight cryptography has been one of the" hot topics" in symmetric cryptography in the
recent years. A huge number of lightweight algorithms have been published, standardized …
recent years. A huge number of lightweight algorithms have been published, standardized …
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains
Chaos-based cryptosystems have been an active area of research in recent years. Although
these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems …
these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems …
[PDF][PDF] A graduate course in applied cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
The LED block cipher
We present a new block cipher LED. While dedicated to compact hardware implementation,
and offering the smallest silicon footprint among comparable block ciphers, the cipher has …
and offering the smallest silicon footprint among comparable block ciphers, the cipher has …
[图书][B] The design of Rijndael
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
LBlock: a lightweight block cipher
W Wu, L Zhang - Applied Cryptography and Network Security: 9th …, 2011 - Springer
In this paper, we propose a new lightweight block cipher called LBlock. Similar to many
other lightweight block ciphers, the block size of LBlock is 64-bit and the key size is 80-bit …
other lightweight block ciphers, the block size of LBlock is 64-bit and the key size is 80-bit …
The PHOTON Family of Lightweight Hash Functions
RFID security is currently one of the major challenges cryptography has to face, often solved
by protocols assuming that an on-tag hash function is available. In this article we present the …
by protocols assuming that an on-tag hash function is available. In this article we present the …
Biclique cryptanalysis of the full AES
Since Rijndael was chosen as the Advanced Encryption Standard (AES), improving upon 7-
round attacks on the 128-bit key variant (out of 10 rounds) or upon 8-round attacks on the …
round attacks on the 128-bit key variant (out of 10 rounds) or upon 8-round attacks on the …
[图书][B] Cryptography engineering: design principles and practical applications
N Ferguson, B Schneier, T Kohno - 2011 - books.google.com
The ultimate guide to cryptography, updated from an author team of the world's top
cryptography experts. Cryptography is vital to keeping information safe, in an era when the …
cryptography experts. Cryptography is vital to keeping information safe, in an era when the …
Boomerang connectivity table: a new cryptanalysis tool
A boomerang attack is a cryptanalysis framework that regards a block cipher E as the
composition of two sub-ciphers E_1 ∘ E_0 E 1∘ E 0 and builds a particular characteristic for …
composition of two sub-ciphers E_1 ∘ E_0 E 1∘ E 0 and builds a particular characteristic for …