Classical and physical security of symmetric key cryptographic algorithms
A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …
electronic communication. The symmetric key algorithms, known as the ciphers, are to …
The welch-gong stream cipher-evolutionary path
This survey presents the rich history of the Welch-Gong (WG) Stream cipher family. It has
been a long journey that lead the WG stream ciphers to become practical. The evolutionary …
been a long journey that lead the WG stream ciphers to become practical. The evolutionary …
Panther: a sponge based lightweight authenticated encryption scheme
KVL Bhargavi, C Srinivasan, KV Lakshmy - Progress in Cryptology …, 2021 - Springer
In the modern era, lots of resource-constrained devices have exploded, creating security
issues that conventional cryptographic primitives cannot solve. These devices are …
issues that conventional cryptographic primitives cannot solve. These devices are …
Fundamentals of Symmetric Key Cryptography
A Baksi, A Baksi - Classical and Physical Security of Symmetric Key …, 2022 - Springer
Fundamentals of Symmetric Key Cryptography | SpringerLink Skip to main content
Advertisement SpringerLink Account Menu Find a journal Publish with us Track your …
Advertisement SpringerLink Account Menu Find a journal Publish with us Track your …
tHyENA: Making HyENA Even Smaller
This paper proposes a lightweight short-tweak tweakable blockcipher (tBC) based
authenticated encryption (AE) scheme tHyENA, a tweakable variant of the high profile NIST …
authenticated encryption (AE) scheme tHyENA, a tweakable variant of the high profile NIST …