Introduction to finite fields and their applications
Introduction to finite fields and their applications
Differential cryptanalysis of the data encryption standard
Differential cryptanalysis of the data encryption standard
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
New types of cryptanalytic attacks using related keys
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Design of Rijndael
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Truncated Differentials and Skipjack
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Differential-Linear Cryptanalysis
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Proceedings of the Third International Workshop on Fast Software Encryption
Truncated Differentials of SAFER
Proceedings of the Third International Workshop on Fast Software Encryption
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Serpent: A New Block Cipher Proposal
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
On the Classification of 4 Bit S-Boxes
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Searching for compact algorithms: CGEN
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
SEA: a scalable encryption algorithm for small embedded applications
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
An analysis of the XSL algorithm
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Small scale variants of the AES
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
HIGHT: a new block cipher suitable for low-resource device
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
mCrypton – a lightweight block cipher for security of low-cost RFID tags and sensors
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Improved time-memory trade-offs with multiple data
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts
Research in Cryptology
Bit-Pattern Based Integral Attack
Fast Software Encryption
Looking Back at a New Hash Function
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Energy and Performance Evaluation of an FPGA-Based SoC Platform with AES and PRESENT Coprocessors
SAMOS '08 Proceedings of the 8th international workshop on Embedded Computer Systems: Architectures, Modeling, and Simulation
Good Variants of HB + Are Hard to Find
Financial Cryptography and Data Security
Hash Functions and RFID Tags: Mind the Gap
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
RFID and Its Vulnerability to Faults
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Ultra-Lightweight Implementations for Smart Devices --- Security for 1000 Gate Equivalents
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Unclonable Lightweight Authentication Scheme
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Chai-Tea, Cryptographic Hardware Implementations of xTEA
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol
Information Security Applications
A Statistical Saturation Attack against the Block Cipher PRESENT
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Attacking ECDSA-Enabled RFID Devices
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Crypto Engineering: Some History and Some Case Studies
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
KATAN and KTANTAN -- A Family of Small and Efficient Hardware-Oriented Block Ciphers
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
TWIS --- A Lightweight Block Cipher
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Saturation Attack on the Block Cipher HIGHT
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
MIBS: A New Lightweight Block Cipher
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Side Channel Cube Attack on PRESENT
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Towards Secure and Practical MACs for Body Sensor Networks
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Two Attacks against the Ff RFID Protocol
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
When Compromised Readers Meet RFID
Information Security Applications
Improving the generalized Feistel
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Lightweight privacy preserving authentication for RFID using a stream cipher
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
PRINTcipher: a block cipher for IC-printing
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Correlation-enhanced power analysis collision attack
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
256 bit standardized crypto for 650 GE: GOST revisited
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
ARMADILLO: a multi-purpose cryptographic primitive dedicated to hardware
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Lightweight cryptography and RFID: tackling the hidden overheads
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
On the security of blockwise secure modes of operation beyond the birthday bound
IEEE Transactions on Information Theory
Multi-trail statistical saturation attacks
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Hummingbird: ultra-lightweight cryptography for resource-constrained devices
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Lighten encryption schemes for secure and private RFID systems
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Lightweight cryptography and DPA countermeasures: a survey
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Efficient authentication for mobile and pervasive computing
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Full-round differential attack on TWIS block cipher
WISA'10 Proceedings of the 11th international conference on Information security applications
Full-custom VLSI design of a unified multiplier for elliptic curve cryptography on RFID tags
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Algebraic side-channel attacks
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Lightweight RFID authentication with forward and backward security
ACM Transactions on Information and System Security (TISSEC)
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
On unbalanced Feistel networks with contracting MDS diffusion
Designs, Codes and Cryptography
PET SNAKE: a special purpose architecture to implement an algebraic attack in hardware
Transactions on computational science X
Switchings, extensions, and reductions in central digraphs
Journal of Combinatorial Theory Series A
Pushing the limits: a very compact and a threshold implementation of AES
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
On linear hulls, statistical saturation attacks, PRESENT and a cryptanalysis of PUFFIN
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Hardware Trojan side-channels based on physical unclonable functions
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Differential cryptanalysis of round-reduced PRINTCIPHER: computing roots of permutations
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Multiple differential cryptanalysis: theory and practice
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Cryptanalysis of PRESENT-like ciphers with secret S-boxes
FSE'11 Proceedings of the 18th international conference on Fast software encryption
A single-key attack on the full GOST block cipher
FSE'11 Proceedings of the 18th international conference on Fast software encryption
LBlock: a lightweight block cipher
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
FPGA implementation of a statistical saturation attack against PRESENT
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Algebraic techniques in differential cryptanalysis revisited
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Algebraic precomputations in differential and integral cryptanalysis
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
A cryptanalysis of PRINTcipher: the invariant subspace attack
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
A new variant of PMAC: beyond the birthday bound
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
A lightweight 256-bit hash function for hardware and low-end devices: lesamnta-LW
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
A review on body area networks security for healthcare
ISRN Communications and Networking
On two RFID privacy notions and their relations
ACM Transactions on Information and System Security (TISSEC)
SPONGENT: a lightweight hash function
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Piccolo: an ultra-lightweight blockcipher
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Recyclable PUFs: logically reconfigurable PUFs
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Poster: practical embedded remote attestation using physically unclonable functions
Proceedings of the 18th ACM conference on Computer and communications security
A comparative study of hardware architectures for lightweight block ciphers
Computers and Electrical Engineering
On the security of NOEKEON against side channel cube attacks
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Linear cryptanalysis of reduced-round PRESENT
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
The sum of CBC MACs is a secure PRF
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Efficient mutual authentication for multi-domain RFID systems using distributed signatures
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Bitwise higher order differential cryptanalysis
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Masking with randomized look up tables
Cryptography and Security
Cryptographic analysis of all 4 × 4-bit s-boxes
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
The cryptographic power of random selection
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Combined differential and linear cryptanalysis of reduced-round PRINTcipher
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
KLEIN: a new family of lightweight block ciphers
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
BUPLE: securing passive RFID communication through physical layer enhancements
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Memory encryption for smart cards
CARDIS'11 Proceedings of the 10th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Cryptanalysis of the light-weight cipher a2u2
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
EPCBC: a block cipher suitable for electronic product code encryption
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
Linear cryptanalysis of PRINTcipher: trails and samples everywhere
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
Practical attack on 8 rounds of the lightweight block cipher KLEIN
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
On the key schedule strength of PRESENT
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Constructing cluster of simple FPGA boards for cryptologic computations
ARC'12 Proceedings of the 8th international conference on Reconfigurable Computing: architectures, tools and applications
Cryptanalysis of mCrypton—A lightweight block cipher for security of RFID tags and sensors
International Journal of Communication Systems
Impossible differential attacks on reduced-round LBlock
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Biclique cryptanalysis of reduced-round piccolo block cipher
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Linear cryptanalysis of reduced-round ICEBERG
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Statistical tools flavor side-channel collision attacks
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Information Processing Letters
A fault attack on the LED block cipher
COSADE'12 Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design
Differential fault analysis of full LBlock
COSADE'12 Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design
Impossible differential cryptanalysis of reduced-round LBlock
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Differential cryptanalysis of reduced-round ICEBERG
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Compact implementation and performance evaluation of block ciphers in ATtiny devices
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
The GLUON family: a lightweight hash function family based on FCSRs
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Security analysis of the lightweight block ciphers XTEA, LED and piccolo
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
On area, time, and the right trade-off
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Compression functions using a dedicated blockcipher for lightweight hashing
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
On the Designing of a Tamper Resistant Prescription RFID Access Control System
Journal of Medical Systems
Randomness analysis on LED block ciphers
Proceedings of the Fifth International Conference on Security of Information and Networks
Cryptanalysis of TWIS block cipher
WEWoRC'11 Proceedings of the 4th Western European conference on Research in Cryptology
"Provable" security against differential and linear cryptanalysis
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
A model for structure attacks, with applications to PRESENT and serpent
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Lapin: an efficient authentication protocol based on Ring-LPN
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Higher-Order masking schemes for s-boxes
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
How far should theory be from practice?: evaluation of a countermeasure
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Algebraic side-channel attacks beyond the hamming weight leakage model
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Towards green cryptography: a comparison of lightweight ciphers from the energy viewpoint
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Lightweight cryptography for the cloud: exploit the power of bitslice implementation
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Low-latency encryption: is "Lightweight = light + wait"?
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Multiple differential cryptanalysis using LLR and χ2
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Cryptanalysis of reduced-round KLEIN block cipher
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Improved related-key differential attacks on reduced-round LBlock
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers
Designs, Codes and Cryptography
Controversy Corner: Efficient Hamming weight-based side-channel cube attacks on PRESENT
Journal of Systems and Software
PRINCE: a low-latency block cipher for pervasive computing applications
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
3kf9: enhancing 3GPP-MAC beyond the birthday bound
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Generic related-key attacks for HMAC
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Many weak keys for PRINTCIPHER: fast key recovery and countermeasures
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Improved (and practical) public-key authentication for UHF RFID tags
CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
On the implementation aspects of sponge-based authenticated encryption for pervasive devices
CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
From Cryptography to Hardware: Analyzing Embedded Xilinx BRAM for Cryptographic Applications
MICROW '12 Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops
Power Analysis of Hardware Implementations Protected with Secret Sharing
MICROW '12 Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops
Cube cryptanalysis of LBlock with noisy leakage
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Comprehensive study of integral analysis on 22-round LBlock
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Practical template-algebraic side channel attacks with extremely low data complexity
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy
Fair and consistent hardware evaluation of fourteen round two SHA-3 candidates
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Improbable differential cryptanalysis
Proceedings of the 6th International Conference on Security of Information and Networks
Hardware trojan design and detection: a practical evaluation
Proceedings of the Workshop on Embedded Systems Security
Light-weight primitive, feather-weight security: a cryptanalytic knock-out
Proceedings of the Workshop on Embedded Systems Security
A low-entropy first-degree secure provable masking scheme for resource-constrained devices
Proceedings of the Workshop on Embedded Systems Security
Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs
Proceedings of the Workshop on Embedded Systems Security
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
Block ciphers that are easier to mask: how far can we go?
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
A new model for error-tolerant side-channel cube attacks
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Two RFID Standard-based Security Protocols for Healthcare Environments
Journal of Medical Systems
Physical Security Evaluation at an Early Design-Phase: A Side-Channel Aware Simulation Methodology
Proceedings of International Workshop on Engineering Simulations for Cyber-Physical Systems
Improbable differential attacks on Present using undisturbed bits
Journal of Computational and Applied Mathematics
Information Processing Letters
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
Information Sciences: an International Journal
Hi-index | 0.06 |
With the establishment of the AES the need for new block ciphers has been greatly diminished; for almost all block cipher applications the AES is an excellent and preferred choice. However, despite recent implementation advances, the AES is not suitable for extremely constrained environments such as RFID tags and sensor networks. In this paper we describe an ultra-lightweight block cipher, present. Both security and hardware efficiency have been equally important during the design of the cipher and at 1570 GE, the hardware requirements for presentare competitive with today's leading compact stream ciphers.