نتایج جستجو برای: aes 128

تعداد نتایج: 29461  

2014
Alex Biryukov Dmitry Khovratovich

We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In contrast to the recent sponge-based proposals, our scheme is fully parallelizable. It also allows flexible key and nonce length, and is one of the few which achieves 128-bit security for both confidentiality and data authenticity with the same key length. The permutation within PAEQ is a new desi...

Journal: :International Journal of Advanced Trends in Computer Science and Engineering 2020

2015
Conrado Porto Lopes Gouvêa Julio López Hernandez

The Galois/Counter Mode is an authenticated encryption scheme which is included in protocols such as TLS and IPSec. Its implementation requires multiplication over a binary finite field, an operation which is costly to implement in software. Recent processors have included instructions aimed to speed up binary polynomial multiplication, an operation which can be used to implement binary field m...

Journal: :IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2023

Authenticated-Encryption with Associated-Data (AEAD) plays an important role in guaranteeing confidentiality, integrity, and authenticity network communications. To meet the requirements of high-performance applications, several AEADs make use AES New Instructions (AES-NI), which can conduct operations encryption decryption dramatically fast by hardware accelerations. At SAC 2013, Wu Preneel pr...

2012
Jingyuan Zhao Meiqin Wang Jiazhe Chen Yuliang Zheng

SAFER+ was a candidate block cipher for AES with 128-bit block size and a variable key sizes of 128, 192 or 256 bits. Bluetooth uses customized versions of SAFER+ for security. The numbers of rounds for SAFER+ with key sizes of 128, 192 and 256 are 8, 12 and 16, respectively. SAFER++, a variant of SAFER+, was among the cryptographic primitives selected for the second phase of the NESSIE project...

2011

● Uses advanced encryption standard (AES) and its cipher-based message authentication code (CMAC) mode of operation for transmitter authentication ● 128, 192 or 256 Bit key sizes supported ● Uses sleep modes for low-power consumption ● Less than 30ms response time ● PC command-line tools for cryptographic key management ● Multiple transmitters supported ● Secure learning mechanism for introduci...

Journal: :IEICE Transactions 2002
Dai Watanabe Soichi Furuya Hirotaka Yoshida Kazuo Takaragi Bart Preneel

We present a new keystream generator (KSG) MUGI, which is a variant of Panama proposed at FSE ’98. MUGI has a 128-bit secret key and a 128-bit initial vector as parameters and generates a 64-bit string per round. The design is particularly suited for efficient hardware implementations, but the software performance of MUGI is excellent as well. A speed optimized implementation in hardware achiev...

2009
Ivan Damg̊ard Marcel Keller

We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + 400 255 expected elementary operations in expected 70 + 20 255 rounds to encrypt one 128-bit block with a 128-bit key. We implemented the variants using VIFF, a software framework for implementing secure multiparty computation (MPC). Tests with three players (passive secu...

Journal: :IACR Cryptology ePrint Archive 2011
Azhar Ali Khan Ghulam Murtaza

Grand Cru, a candidate cipher algorithm of NESSIE project, is based on the strategy of multiple layered security and derived from AES-128. This algorithm was not selected for second phase evaluation of NESSIE project due to implementation and processing cost. In this paper we present relatively a fast implementation of the cipher using Texas Instrument’s DSP C64x+.

Journal: :RFC 2011
Masanobu Katagi Shiho Moriai

We propose a new 128-bit blockcipher CLEFIA supporting key lengths of 128, 192 and 256 bits, which is compatible with AES. CLEFIA achieves enough immunity against known attacks and flexibility for efficient implementation in both hardware and software by adopting several novel and state-of-the-art design techniques. CLEFIA achieves a good performance profile both in hardware and software. In ha...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید