Open Access
The 128-Bit Blockcipher CLEFIA.
Masanobu Katagi,Shiho Moriai +1 more
- Vol. 6114, pp 1-33
Reads0
Chats0
TLDR
A new 128-bit blockcipher CLEFIA supporting key lengths of 128, 192 and 256 bits, which is compatible with AES is proposed, which achieves enough immunity against known attacks and flexibility for efficient implementation in both hardware and software.About:
The article was published on 2011-01-01 and is currently open access. It has received 167 citations till now. The article focuses on the topics: CLEFIA.read more
Citations
More filters
Book ChapterDOI
Piccolo: an ultra-lightweight blockcipher
TL;DR: Piccolo is one of the competitive ultra-lightweight blockciphers which is suitable for extremely constrained environments such as RFID tags and sensor nodes and its efficiency on the energy consumption which is evaluated by energy per bit is also remarkable.
Posted Content
PRINCE – A Low-latency Block Cipher for Pervasive Computing Applications
Julia Borghoff,Anne Canteaut,Tim Güneysu,Elif Bilge Kavun,Miroslav Knežević,Lars R. Knudsen,Gregor Leander,Ventzislav Nikov,Christof Paar,Christian Rechberger,Peter Maria Franciscus Rombouts,Søren S. Thomsen,Tolga Yalcin +12 more
TL;DR: This paper presents a block cipher that is optimized with respect to latency when implemented in hardware and holds that decryption for one key corresponds to encryption with a related key, which is of independent interest and proves its soundness against generic attacks.
Journal ArticleDOI
A roadmap for security challenges in the Internet of Things
TL;DR: According to the novel taxonomy of IoT framework, different research challenges will be highlighted, important solutions and research activities will be exposed, and interesting research directions will be proposed to ensure security of IoT components and applications.
Posted Content
LBlock: A Lightweight Block Cipher.
Wenling Wu,Lei Zhang +1 more
TL;DR: The security evaluation shows that LBlock can achieve enough security margin against known attacks, such as differential crypt analysis, linear cryptanalysis, impossible differential cryptanalysis and related-key attacks etc.
Book ChapterDOI
Midori: A Block Cipher for Low Energy
Subhadeep Banik,Andrey Bogdanov,Takanori Isobe,Kyoji Shibutani,Harunaga Hiwatari,Toru Akishita,Francesco Regazzoni +6 more
TL;DR: This paper presents the block cipher Midorii¾?, the Japanese translation for the word Green, that is optimized with respect to the energy consumed by the circuit per bt in encryption or decryption operation, and proposes two energy-efficient block ciphers Midori128i½?and Midori64i¼?
References
More filters
Book
Differential Cryptanalysis of the Data Encryption Standard
Eli Biham,Adi Shamir +1 more
TL;DR: This book introduces a new cryptographic method, called differential cryptanalysis, which can be applied to analyze cryptosystems, and describes the cryptanalysis of DES, deals with the influence of its building blocks on security, and analyzes modified variants.
Book ChapterDOI
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
TL;DR: In this article, the security of S-boxes in block ciphers was studied under an additional hypothesis that the S-box can be described by an overdefined system of algebraic equations.
Book ChapterDOI
The Block Cipher Square
TL;DR: A new 128-bit block cipher called Square, which concentrates on the resistance against differential and linear cryptanalysis, and the publication of the resulting cipher for public scrutiny is published.
Book ChapterDOI
HIGHT: a new block cipher suitable for low-resource device
Deukjo Hong,Jaechul Sung,Seokhie Hong,Jongin Lim,Sangjin Lee,Bon-Seok Koo,Changhoon Lee,Donghoon Chang,Jesang Lee,Kitae Jeong,Hyun Kim,Jongsung Kim,Seongtaek Chee +12 more
TL;DR: This paper proposes a new block cipher HIGHT with 64-bit block length and 128-bit key length, which provides low-resource hardware implementation, which is proper to ubiquitous computing device such as a sensor in USN or a RFID tag.
Book ChapterDOI
Markov ciphers and differential cryptanalysis
TL;DR: It is shown that PES (8) and PES(16) are immune to differential cryptanalysis after sufficiently many rounds, and a new design principle for Markov ciphers, viz., that their transition probability matrices should not be symmetric is suggested.