Citations
545 |
Linear cryptanalysis method for DES cipher
- Matsui
- 1994
(Show Context)
Citation Context ...rmations. Thesestransformations make a good defensive mechanism against various security attacks. The single s-box of DESLsis resistant against Differential Cryptanalysis [8] and Linear Cryptanalysis =-=[9]-=-.sThe constants generated by the linear feedback shift register of HIGHT increases the randomness of thessub keys. It also provides good resistance against slide attack [11]. The final transformation ... |
420 |
Differential Cryptanalysis of the Data Encryption Standard.
- Biham, Shamir
- 1993
(Show Context)
Citation Context ...ear and key dependant transformations. Thesestransformations make a good defensive mechanism against various security attacks. The single s-box of DESLsis resistant against Differential Cryptanalysis =-=[8]-=- and Linear Cryptanalysis [9].sThe constants generated by the linear feedback shift register of HIGHT increases the randomness of thessub keys. It also provides good resistance against slide attack [1... |
208 |
Strong authentication for RFID systems using the AES algorithm,
- Feldhofer, Dominikus, et al.
- 2004
(Show Context)
Citation Context ...hese low resource devices. Thesesspecifically designed algorithms are called light weight cryptographic algorithms, which are of two types: blocksciphers and stream ciphers. The block ciphers are AES =-=[5]-=-, DESL [4], HIGHT [3] and PRESENT [2]. The streamsciphers are Trivium [6] and Grain [7]. Humming bird-2 [1] is having the properties of both. In this paper a briefsover view of the above mentioned alg... |
101 | W.: Grain: a Stream Cipher for Constrained Environments
- Hell, Johansson, et al.
- 2007
(Show Context)
Citation Context ...ht cryptographic algorithms, which are of two types: blocksciphers and stream ciphers. The block ciphers are AES [5], DESL [4], HIGHT [3] and PRESENT [2]. The streamsciphers are Trivium [6] and Grain =-=[7]-=-. Humming bird-2 [1] is having the properties of both. In this paper a briefsover view of the above mentioned algorithms is given. The paper also analyses the security systems and hardwaresimplementat... |
71 | Advanced Slide Attacks.
- Biryukov, Wagner
- 2000
(Show Context)
Citation Context ...8] and Linear Cryptanalysis [9].sThe constants generated by the linear feedback shift register of HIGHT increases the randomness of thessub keys. It also provides good resistance against slide attack =-=[11]-=-. The final transformation and round functionsresist the differential and linear cryptanalysis. Related key attacks [10] are resisted by strong key schedule.sThe combination of sBoxLayer and pBoxLayer... |
64 | HIGHT: A New Block Cipher Suitable for Low-Resource Device,”
- Hong, Sung, et al.
- 2006
(Show Context)
Citation Context ...ices. Thesesspecifically designed algorithms are called light weight cryptographic algorithms, which are of two types: blocksciphers and stream ciphers. The block ciphers are AES [5], DESL [4], HIGHT =-=[3]-=- and PRESENT [2]. The streamsciphers are Trivium [6] and Grain [7]. Humming bird-2 [1] is having the properties of both. In this paper a briefsover view of the above mentioned algorithms is given. The... |
31 | A collision attack on 7 rounds of Rijndael
- Gilbert, Minier
(Show Context)
Citation Context ...annot be slid and a non linear operation is used to mix the contents of the key register. The bitwise operationssof PRESENT resist structural attacks like integral attacks [12] and bottleneck attacks =-=[13]-=-.sHumming bird-2 can resists security attacks like Differential Cryptanalysis and Linear Cryptanalysis. Itsis found from the security analysis that Humming bird-2 is resistant against linear cryptanal... |
11 |
et al., “PRESENT: an ultra-lightweight block cipher
- Bogdanov, Knudsen, et al.
- 2007
(Show Context)
Citation Context ...ifically designed algorithms are called light weight cryptographic algorithms, which are of two types: blocksciphers and stream ciphers. The block ciphers are AES [5], DESL [4], HIGHT [3] and PRESENT =-=[2]-=-. The streamsciphers are Trivium [6] and Grain [7]. Humming bird-2 [1] is having the properties of both. In this paper a briefsover view of the above mentioned algorithms is given. The paper also anal... |
1 |
Eric M. Smith “The Hummingbird-2 Light weight Authenticated Encryption Algorithm
- Engels, Saarinen, et al.
- 2011
(Show Context)
Citation Context ...orithms, which are of two types: blocksciphers and stream ciphers. The block ciphers are AES [5], DESL [4], HIGHT [3] and PRESENT [2]. The streamsciphers are Trivium [6] and Grain [7]. Humming bird-2 =-=[1]-=- is having the properties of both. In this paper a briefsover view of the above mentioned algorithms is given. The paper also analyses the security systems and hardwaresimplementations of these algori... |
1 |
Preneel TRIVIUM Specifications. eSTREAM, ECRYPT Stream Cipher Project Report 2005/030
- Canniere, B
- 2005
(Show Context)
Citation Context ...led light weight cryptographic algorithms, which are of two types: blocksciphers and stream ciphers. The block ciphers are AES [5], DESL [4], HIGHT [3] and PRESENT [2]. The streamsciphers are Trivium =-=[6]-=- and Grain [7]. Humming bird-2 [1] is having the properties of both. In this paper a briefsover view of the above mentioned algorithms is given. The paper also analyses the security systems and hardwa... |