• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 16,567
Next 10 →

Table 2. Comparison of lightweight cipher implementations

in PRESENT: An Ultra-Lightweight Block Cipher
by A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, C. Vikkelsoe 2007
Cited by 3

Table 1: Cipher suite

in Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography
by A. Murat Fiskiran , Ruby B. Lee
"... In PAGE 1: ... 2. Cipher suite The symmetric-key ciphers we consider in this study are shown in Table1 . AES is the NIST standard for block encryption and it is included in many widely- used security protocols such as IPSec, TLS, and SSH [1].... ..."

Table 3: Susceptibility Evaluation for Several Block Ciphers

in An Improved Power Analysis Attack Against Camellia's Key Schedule
by Lu Xiao And, Lu Xiao, Howard M. Heys 2005
"... In PAGE 12: ...22. Table3 shows the susceptibility of DES, IDEA, SAFER++ [15], AES (deduced from [10]), SHACAL-0 and SHACAL-1 [16] toward similar attacks. The values of j j and listed in this table are based on our assessment of values that can lead to a real attack.... ..."

Table 5 Basic features of compared block ciphers.

in FPGA Implementations of the ICEBERG Block Cipher
by F. -x. St, G. Piret, G. Rouvroy, J. -j. Quisquater

Table 6 Performances of compared block ciphers.

in FPGA Implementations of the ICEBERG Block Cipher
by F. -x. St, G. Piret, G. Rouvroy, J. -j. Quisquater

Table. 1. The performance of block ciphers I and II.

in KARTIK AUDHKHASI: CHAOS BASED CRYPTOGRAPHY 1 Chaos Based Cryptography
by Kartik Audhkhasi

Table 3.3.1: Block ciphers

in University advisor(s):
by Sergey Smirnov, Sergey Smirnov, Henric Johnson 2007

Table 9: Performance of di erent block ciphers (on a Pentium)

in Twofish: A 128-Bit Block Cipher
by Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson 1998
"... In PAGE 53: ... Its speed is 65 clock cycles per byte of encryption, which makes it less desirable than faster, also secure, alternatives. With that in mind, Table9 gives performance met- rics for block and stream ciphers on the Pentium processor.23 11 Using Two sh 11.... ..."
Cited by 52

Table 9: Performance of di erent block ciphers (on a Pentium)

in Twofish: A 128-Bit Block Cipher
by Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson 1998
"... In PAGE 53: ... Its speed is 65 clock cycles per byte of encryption, which makes it less desirable than faster, also secure, alternatives. With that in mind, Table9 gives performance met- rics for block and stream ciphers on the Pentium processor.23 11 Using Two sh 11.... ..."
Cited by 52

Table 6. Relation between block and stream cipher tradeoff attacks.

in Some Thoughts on Time-Memory-Data Tradeoffs
by Alex Biryukov 2005
"... In PAGE 3: ... The tradeoff presented in this paper is an analogy of the Time-Memory-Data tradeoffs for stream ciphers given by Biryukov-Shamir [4]. See Table6... ..."
Cited by 1
Next 10 →
Results 1 - 10 of 16,567
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University