How to construct pseudorandom permutations from pseudorandom functions
SIAM Journal on Computing - Special issue on cryptography
Differential cryptanalysis of the data encryption standard
Differential cryptanalysis of the data encryption standard
Constructing Symmetric Ciphers Using the CAST Design Procedure
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
BEAST: a fast block cipher for arbitrary blocksizes
Proceedings of the IFIP TC6/TC11 international conference on Communications and multimedia security II
A Secure, Accountable, and Collaborative Whiteboard
IDMS '98 Proceedings of the 5th International Workshop on Interactive Distributed Multimedia Systems and Telecommunication Services
The Performance of Modern Block Ciphers in Java
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
The First Experimental Cryptanalysis of the Data Encryption Standard
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
MDx-MAC and Building Fast MACs from Hash Functions
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Keying Hash Functions for Message Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
How to Protect DES Against Exhaustive Key Search
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Fast Software Encryption, Cambridge Security Workshop
Performance of Symmetric Ciphers and One-Way Hash Functions
Fast Software Encryption, Cambridge Security Workshop
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
Fast Software Encryption, Cambridge Security Workshop
A Software-Optimised Encryption Algorithm
Fast Software Encryption, Cambridge Security Workshop
RIPEMD-160: A Strengthened Version of RIPEMD
Proceedings of the Third International Workshop on Fast Software Encryption
Proceedings of the Third International Workshop on Fast Software Encryption
Proceedings of the Third International Workshop on Fast Software Encryption
Unbalanced Feistel Networks and Block Cipher Design
Proceedings of the Third International Workshop on Fast Software Encryption
Two Practical and Provably Secure Block Ciphers: BEARS and LION
Proceedings of the Third International Workshop on Fast Software Encryption
x2 Cryptanalysis of the SEAL Encryption Algorithm
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
On the Security of Remotely Keyed Encryption
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Remotely keyed encryption using non-encrypting smart cards
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Markov ciphers and differential cryptanalysis
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
A simplified and generalized treatment of Luby-Rackoff pseudorandom permutation generators
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
Multimedia applications often serve high-bandwidth channels. Thus, if encryption is required, cryptographic security often conflicts with efficiency. In the current paper, we consider the efficiency of unbalanced Luby-Rackoff ciphers. Such ciphers can operate very fast on large blocks of data and can easily cope with flexible block sizes. Anderson and Biham proposed two unbalanced Luby/Rackoff ciphers: LION and BEAR. An even faster algorithm is BEAST (Block Encryption Algorithm with Shortcut in the Third round). Like BEAR and LION, BEAST is assembled from a key-dependent hash function and a stream cipher. BEAST it is provably secure if these building blocks are secure. We evaluate the JAVA performance of BEAR, LION, and BEAST. For the sake of comparison, we also evaluate the performance of some well-known proven 64-bit block ciphers.