Results 1 - 10
of
16,567
Table 2. Comparison of lightweight cipher implementations
2007
Cited by 3
Table 1: Cipher suite
"... In PAGE 1: ... 2. Cipher suite The symmetric-key ciphers we consider in this study are shown in Table1 . AES is the NIST standard for block encryption and it is included in many widely- used security protocols such as IPSec, TLS, and SSH [1].... ..."
Table 3: Susceptibility Evaluation for Several Block Ciphers
2005
"... In PAGE 12: ...22. Table3 shows the susceptibility of DES, IDEA, SAFER++ [15], AES (deduced from [10]), SHACAL-0 and SHACAL-1 [16] toward similar attacks. The values of j j and listed in this table are based on our assessment of values that can lead to a real attack.... ..."
Table 5 Basic features of compared block ciphers.
Table. 1. The performance of block ciphers I and II.
Table 9: Performance of di erent block ciphers (on a Pentium)
1998
"... In PAGE 53: ... Its speed is 65 clock cycles per byte of encryption, which makes it less desirable than faster, also secure, alternatives. With that in mind, Table9 gives performance met- rics for block and stream ciphers on the Pentium processor.23 11 Using Two sh 11.... ..."
Cited by 52
Table 9: Performance of di erent block ciphers (on a Pentium)
1998
"... In PAGE 53: ... Its speed is 65 clock cycles per byte of encryption, which makes it less desirable than faster, also secure, alternatives. With that in mind, Table9 gives performance met- rics for block and stream ciphers on the Pentium processor.23 11 Using Two sh 11.... ..."
Cited by 52
Table 6. Relation between block and stream cipher tradeoff attacks.
2005
"... In PAGE 3: ... The tradeoff presented in this paper is an analogy of the Time-Memory-Data tradeoffs for stream ciphers given by Biryukov-Shamir [4]. See Table6... ..."
Cited by 1
Results 1 - 10
of
16,567