• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 318
Next 10 →

LBlock: a lightweight block cipher

by Wenling Wu, Lei Zhang - IN: APPLIED CRYPTOGRAPHY AND NETWORK SECURITY , 2011
"... In this paper, we propose a new lightweight block cipher called LBlock. Similar to many other lightweight block ciphers, the block size of LBlock is 64-bit and the key size is 80-bit. Our security evaluation shows that LBlock can achieve enough security margin against known attacks, such as differ ..."
Abstract - Cited by 32 (2 self) - Add to MetaCart
In this paper, we propose a new lightweight block cipher called LBlock. Similar to many other lightweight block ciphers, the block size of LBlock is 64-bit and the key size is 80-bit. Our security evaluation shows that LBlock can achieve enough security margin against known attacks

Cryptanalysis of the Speck Family of Block Ciphers

by unknown authors , 2013
"... Abstract. Simon and Speck are two families of ultra-lightweight block ciphers which were announced by the U.S. National Security Agency in June 2013. This paper presents differential and rectangle attacks for almost all members of the Speck family of ciphers, where we target up to 11/22, 12/23, 15/2 ..."
Abstract - Add to MetaCart
Abstract. Simon and Speck are two families of ultra-lightweight block ciphers which were announced by the U.S. National Security Agency in June 2013. This paper presents differential and rectangle attacks for almost all members of the Speck family of ciphers, where we target up to 11/22, 12/23, 15

The LED Block Cipher

by Jian Guo, Thomas Peyrin, Axel Poschmann, Matt Robshaw - Cryptographic Hardware and Embedded Systems - CHES 2011, volume 6917 of LNCS , 2011
"... Abstract. We present a new block cipher LED. While dedicated to compact hardware implementation, and offering the smallest silicon footprint among comparable block ciphers, the cipher has been designed to simultaneously tackle three additional goals. First, we explore the role of an ultra-light (in ..."
Abstract - Cited by 71 (7 self) - Add to MetaCart
compact in hardware, we aim to maintain a reasonable performance profile for software implementation. Key words: lightweight, block cipher, RFID tag, AES. 1

A Survey on Lightweight Block Ciphers

by Prabhat Kumar Kushwaha, M. P. Singh, Prabhat Kumar
"... Ubiquitous and pervasive computing are new era of computing and it needs lightweight cryptographic algorithms for security. Lightweight cryptography is used for resource constrained devices (which have limited memory, limited power and less processing capability) such as radio frequency identificati ..."
Abstract - Add to MetaCart
identification (RFID) tags, con-tactless smart cards, wireless sensor network, health care devices and internet of things (IoT). The design of lightweight block ci-pher has been active research topic over the years. The com-parative evaluations of these block ciphers (which actually reach low cost goal) on any

Analysis of Lightweight Stream Ciphers

by Simon Fischer - PHD THESIS , 2008
"... Stream ciphers are fast cryptographic primitives to provide confidentiality of electronically transmitted data. They can be very suitable in environments with restricted resources, such as mobile devices or embedded systems. Practical examples are cell phones, RFID transponders, smart cards or devic ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
or devices in sensor networks. Besides efficiency, security is the most important property of a stream cipher. In this thesis, we address cryptanalysis of modern lightweight stream ciphers. We derive and improve cryptanalytic methods for different building blocks and present dedicated attacks on specific

A Family of Light-Weight Block Ciphers Based on DES Suited For RFID Applications

by Axel Poschmann, Gregor Leander, Kai Schramm, Christof Paar - PROCEEDINGS OF FSE 2007, LNCS , 2006
"... We propose a new block cipher, DESL (DES Lightweight extension), which is strong, compact and efficient. Due to its low chip size constraints DESL is especially suited for RFID (Radio Frequency Identification) devices. Our proposed DESL is based on the classical DES (Data Encryption Standard) des ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
We propose a new block cipher, DESL (DES Lightweight extension), which is strong, compact and efficient. Due to its low chip size constraints DESL is especially suited for RFID (Radio Frequency Identification) devices. Our proposed DESL is based on the classical DES (Data Encryption Standard

Triathlon of Lightweight Block Ciphers for the Internet of Things

by Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Leo Perrin, Johann Großschädl, Alex Biryukov - CRYPTOLOGY EPRINT ARCHIVE, REPORT 2015/209 , 2015
"... Abstract. In this paper we introduce an open framework for the benchmarking of lightweight block ciphers on a multitude of embedded platforms. Our framework is able to evaluate execution time, RAM footprint, as well as (binary) code size, and allows a user to define a custom "figure of merit&qu ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
Abstract. In this paper we introduce an open framework for the benchmarking of lightweight block ciphers on a multitude of embedded platforms. Our framework is able to evaluate execution time, RAM footprint, as well as (binary) code size, and allows a user to define a custom "figure of merit

I-PRESENT TM: An Involutive Lightweight Block Cipher

by Muhammad Reza Z’aba, Norziana Jamil, Mohd Ezanee Rusli, Md. Zaini Jamaludin, Ahmad Azlan, Mohd Yasir
"... This paper proposes a new involutive light-weight block cipher for resource-constraint environments called I-PRESENT TM. The design is based on the Present block cipher which is included in the ISO/IEC 29192 standard on lightweight cryptography. The advantage of I-PRESENT TM is that the cipher is in ..."
Abstract - Add to MetaCart
This paper proposes a new involutive light-weight block cipher for resource-constraint environments called I-PRESENT TM. The design is based on the Present block cipher which is included in the ISO/IEC 29192 standard on lightweight cryptography. The advantage of I-PRESENT TM is that the cipher

Exploring Energy Efficiency of Lightweight Block Ciphers

by Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni
"... Abstract. In the last few years, the field of lightweight cryptography has seen an influx in the number of block ciphers and hash functions being proposed. One of the metrics that define a good lightweight design is the energy consumed per unit operation of the algorithm. For block ciphers, this ope ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract. In the last few years, the field of lightweight cryptography has seen an influx in the number of block ciphers and hash functions being proposed. One of the metrics that define a good lightweight design is the energy consumed per unit operation of the algorithm. For block ciphers

Implementing Lightweight Block Ciphers on x86 Architectures

by Ryad Benadjila, Jian Guo, Victor Lomné, Thomas Peyrin
"... Abstract. Lightweight block ciphers are designed so as to fit into very constrained environments, but usually not really with software performance in mind. For classical lightweight applications where many constrained devices communicate with a server, it is also crucial that the cipher has good sof ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract. Lightweight block ciphers are designed so as to fit into very constrained environments, but usually not really with software performance in mind. For classical lightweight applications where many constrained devices communicate with a server, it is also crucial that the cipher has good
Next 10 →
Results 11 - 20 of 318
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University