نتایج جستجو برای: lightweight block cipher

تعداد نتایج: 184528  

2015
Zhenzhen Bao Peng Luo Dongdai Lin

Due to the demand for low-cost cryptosystems from industry, there spring up a lot of lightweight block ciphers which are excellent for some different implementation features. An innovative design is the block cipher PRINCE. To meet the requirement for low-latency and instantaneously encryption, NXP Semiconductors and its academic partners cooperate and design the low-latency block cipher PRINCE...

Journal: :Computer Communications 2006
Bo Sun Chung-Chih Li Kui Wu Yang Xiao

In this paper, based on a Linear Congruential Generator (LCG), we propose a new block cipher that is suitable for constructing a lightweight secure protocol for resource-constrained wireless sensor networks. From the cryptanalysis point of view, our building block is considered secure if the attacker cannot obtain the pseudo-random numbers generated by the LCG. The Plumstead’s inference algorit...

2008
Xu Guo Zhimin Chen Patrick Schaumont

Hardware implementations of block ciphers have been intensively evaluated for years. The hardware profile, including the performance, area and power of a block cipher, only considers the block cipher as a standalone component, and does not consider it as a coprocessor in a system design. In this paper we consider system integration of AES and PRESENT crypto coprocessors, and analyze the system ...

2016
Ray Beaulieu Douglas Shors Jason Smith Stefan Treatman-Clark Bryan Weeks Louis Wingers

Simon and Speck are families of lightweight block ciphers proposed in June 2013 by the US National Security Agency. Here we discuss ASIC implementations of these algorithms, presenting in some detail how one implements the smallest bit-serial versions of the algorithms. We also give area and throughput results for a variety of implementations—bit serial, iterated, and partially and fully pipeli...

2015

Security and privacy are going to be the key factors for the deployment of new applications, since people will only accept these deployments if these are based on secure, trustworthy and privacy-preserving infra-structures. Cryptography plays a major role in the security of data transmission and the development of computing technology imposes stronger requirements on the cryptography schemes. L...

Journal: :IACR Cryptology ePrint Archive 2010
Bozhan Su Wenling Wu Lei Zhang Yanjun Li

The 128-bit block cipher TWIS was proposed by Ojha et al in 2009. It is a lightweight block cipher and its design is inspired from CLEFIA. In this paper, we first study the properties of TWIS structure, and as an extension we also considered the generalized TWIS-type structure which can be called G-TWIS cipher, where the block size and round number can be arbitrary values. Then we present a ser...

2017
Sufyan Salim Mahmood AlDabbagh A. Bogdanov L. Knudsen G. Leander C. Paar A. Poschmann M. Robshaw Y. Seurin

1. Panasenko, S., & Smagin, S., “Lightweight Cryptography: Underlying Principles and Approaches”, International Journal of Computer Theory and Engineering, Vol 3 No.4, (2011). 2. S. Salim and I. Taha, "Lightweight block ciphers: comparative study," Journal of Advanced Computer Science and Technology Research (JACSTR), vol. 2, pp. 159-165, 2012. 3. J. Borghoff, et al., "PRINCE – A Low-Latency Bl...

Journal: :CoRR 2017
Jaber Hosseinzadeh Abbas Ghaemi Bafghi

Lightweight ciphers are the form of encryption that strictly limited to devices such as tags, RFID, wireless sensor networks applications. Low-resource devices has many limitations in power, energy and memory. In this work, the lightweight block ciphers is implemented on the Atmega128 microprocessor and the results of the energy perspectives and memory were assessed. The results of the evaluati...

Journal: :IACR Cryptology ePrint Archive 2014
Benjamin Buhrow Paul Riemer Mike Shea Barry K. Gilbert Erik S. Daniel

Embedded microcontroller applications often experience multiple limiting constraints: memory, speed, and for a wide range of portable devices, power. Applications requiring encrypted data must simultaneously optimize the block cipher algorithm and implementation choice against these limitations. To this end we investigate block cipher implementations that are optimized for speed and energy effi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید