scispace - formally typeset
Search or ask a question
Topic

CLEFIA

About: CLEFIA is a research topic. Over the lifetime, 124 publications have been published within this topic receiving 3350 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: CLEFIA is one of the light weight cryptography algorithms which suits the resource constrained environments in providing security thus enhancing the security of embedded systems.
Abstract: Lightweight cryptography is a class in cryptography that is employed in resource constrained devices like embedded systems to provide security. CLEFIA is one of the light weight cryptography algorithms which suits the resource constrained environments in providing security thus enhancing

1 citations

Posted Content
TL;DR: In this article, a series of 10-round and n-round differential distinguishers for TWIS and G-TWIS are presented, whose probabilities are all equal to 1.
Abstract: The 128-bit block cipher TWIS was proposed by Ojha et al in 2009. It is a lightweight block cipher and its design is inspired from CLEFIA. In this paper, we first study the properties of TWIS structure, and as an extension we also considered the generalized TWIS-type struc- ture which can be called G-TWIS cipher, where the block size and round number can be arbitrary values. Then we present a series of 10-round dif- ferential distinguishers for TWIS and a n-round differential distinguisher for G-TWIS whose probabilities are all equal to 1. Therefore, by utilizing these kinds of differential distinguishers, we can break the full 10-round TWIS cipher and n-round G-TWIS cipher.

1 citations

Journal ArticleDOI
TL;DR: In this paper a bit-level optimization was sought over some operative structures of the algorithm, taking advantage of the 32-bit architecture in the development platform, generating a better response time for the application and an increase of the Throughput performance regarding the reference code by SONY.
Abstract: Objectives: This paper shows an optimized code for light-weight cipher algorithms, attempting to keep the balance between the use of resources and the communication speed. Methods/Analysis: A real performance analysis is applied to the cryptographic algorithm CLEFIA, under the standards by ISO/IEC 29192-2, by means of a code optimization for key scheduling through bit-oriented instructions. It is used the Freescale KL25Z development board for the measure of response times and the structural blocks’ execution times for the cipher algorithm. Findings: In this paper a bit-level optimization was sought over some operative structures of the algorithm, taking advantage of the 32-bit architecture in the development platform, generating this way a better response time for the application and an increase of the Throughput performance regarding the reference code by SONY. Novelty/Improvement: This application was developed so it can be used by many platforms into any electronic application, which requires an encryption process, where the use of a PC is not worthy because of the size and cost.
Book ChapterDOI
01 Jan 2017
TL;DR: This chapter presents concrete ciphers based on the constructions studied previously, and provides examples of balanced, unbalanced and generalized Feistel cipher.
Abstract: In this chapter, we present concrete ciphers based on the constructions studied previously. We provide examples of balanced, unbalanced and generalized Feistel ciphers. For each of them, we give the description and a survey of attacks performed on these ciphers.
Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
84% related
Public-key cryptography
27.2K papers, 547.7K citations
82% related
Encryption
98.3K papers, 1.4M citations
81% related
Hash function
31.5K papers, 538.5K citations
81% related
Authentication
74.7K papers, 867.1K citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
20213
20208
20199
20182
20178