State of the art in lightweight symmetric cryptography

A Biryukov, L Perrin - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Lightweight cryptography has been one of the" hot topics" in symmetric cryptography in the
recent years. A huge number of lightweight algorithms have been published, standardized …

Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains

U Zia, M McCartney, B Scotney, J Martinez… - International Journal of …, 2022 - Springer
Chaos-based cryptosystems have been an active area of research in recent years. Although
these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems …

[PDF][PDF] A graduate course in applied cryptography

D Boneh, V Shoup - Draft 0.5, 2020 - dlib.hust.edu.vn
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …

The LED block cipher

J Guo, T Peyrin, A Poschmann, M Robshaw - Cryptographic Hardware and …, 2011 - Springer
We present a new block cipher LED. While dedicated to compact hardware implementation,
and offering the smallest silicon footprint among comparable block ciphers, the cipher has …

[图书][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

LBlock: a lightweight block cipher

W Wu, L Zhang - Applied Cryptography and Network Security: 9th …, 2011 - Springer
In this paper, we propose a new lightweight block cipher called LBlock. Similar to many
other lightweight block ciphers, the block size of LBlock is 64-bit and the key size is 80-bit …

The PHOTON Family of Lightweight Hash Functions

J Guo, T Peyrin, A Poschmann - … , Santa Barbara, CA, USA, August 14-18 …, 2011 - Springer
RFID security is currently one of the major challenges cryptography has to face, often solved
by protocols assuming that an on-tag hash function is available. In this article we present the …

Biclique cryptanalysis of the full AES

A Bogdanov, D Khovratovich, C Rechberger - Advances in Cryptology …, 2011 - Springer
Since Rijndael was chosen as the Advanced Encryption Standard (AES), improving upon 7-
round attacks on the 128-bit key variant (out of 10 rounds) or upon 8-round attacks on the …

[图书][B] Cryptography engineering: design principles and practical applications

N Ferguson, B Schneier, T Kohno - 2011 - books.google.com
The ultimate guide to cryptography, updated from an author team of the world's top
cryptography experts. Cryptography is vital to keeping information safe, in an era when the …

Boomerang connectivity table: a new cryptanalysis tool

C Cid, T Huang, T Peyrin, Y Sasaki, L Song - … , Tel Aviv, Israel, April 29-May …, 2018 - Springer
A boomerang attack is a cryptanalysis framework that regards a block cipher E as the
composition of two sub-ciphers E_1 ∘ E_0 E 1∘ E 0 and builds a particular characteristic for …