A cryptographic file system for UNIX
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Cryptography for PC/workstation security
ACM SIGICE Bulletin
On the distribution of characteristics in bijective mappings
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
On the security of the IDEA block cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Constructing Symmetric Ciphers Using the CAST Design Procedure
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments
Distributed and Parallel Databases - Security of data and transaction processing
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
Avalanche Characteristics of Substitution-Permutation Encryption Networks
IEEE Transactions on Computers
Diminished-One Modulo 2^n +1 Adder Design
IEEE Transactions on Computers
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Square-like Attacks on Reduced Rounds of IDEA
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
On the Distribution of Characteristics in Composite Permutations
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Informatics - 10 Years Back. 10 Years Ahead.
8 Gigabits per Second Implementation of the IDEA Cryptographic Algorithm
FPL '02 Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
Miss in the Middle Attacks on IDEA and Khufu
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
New Results on the Pseudorandomness of Some Blockcipher Constructions
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Optimized Self-Synchronizing Mode of Operation
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
CryptoBooster: A Reconfigurable and Modular Cryptographic Coprocessor
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
On Boolean and Arithmetic Masking against Differential Power Analysis
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Tradeoffs in Parallel and Serial Implementations of the International Data Encryption Algorithm IDEA
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
A Sound Method for Switching between Boolean and Arithmetic Masking
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
IDEA: A Cipher For Multimedia Architectures?
SAC '98 Proceedings of the Selected Areas in Cryptography
A Bit-Serial Implementation of the International Data Encryption Algorithm IDEA
FCCM '00 Proceedings of the 2000 IEEE Symposium on Field-Programmable Custom Computing Machines
Secure hybrid robust watermarking resistant against tampering and copy attack
Signal Processing - Special section: Security of data hiding technologies
Modulo 2n ± 1 Adder Design Using Select-Prefix Blocks
IEEE Transactions on Computers
Security on FPGAs: State-of-the-art implementations and attacks
ACM Transactions on Embedded Computing Systems (TECS)
Authenticated key agreement in dynamic peer groups
Theoretical Computer Science
Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security
The Journal of Supercomputing
A novel color image hiding scheme using block truncation coding
Fundamenta Informaticae
An Operation-Centered Approach to Fault Detection in Symmetric Cryptography Ciphers
IEEE Transactions on Computers
Implementation of IPv6 in 4.4 BSD
ATEC '96 Proceedings of the 1996 annual conference on USENIX Annual Technical Conference
An optimized protocol for mobile network authentication and security
ACM SIGMOBILE Mobile Computing and Communications Review
Designs, Codes and Cryptography
Implementation of secure applications in self-reconfigurable systems
Microprocessors & Microsystems
Design of secure hardware for ATM networks
TELE-INFO'05 Proceedings of the 4th WSEAS International Conference on Telecommunications and Informatics
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Increasing the security of e-commerce systems using multi-agents
International Journal of Business Information Systems
64-bit Block ciphers: hardware implementations and comparison analysis
Computers and Electrical Engineering
The Key-Dependent Attack on Block Ciphers
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Secure transcoders for single layer video data
Image Communication
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Markov ciphers and differential cryptanalysis
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Hash functions based on block ciphers
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Resistance against general iterated attacks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
XOR and non-XOR differential probabilities
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Improved DST Cryptanalysis of IDEA
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
VECPAR'06 Proceedings of the 7th international conference on High performance computing for computational science
Improving the time complexity of Matsui's linear cryptanalysis
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Linear cryptanalysis of non binary ciphers
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
SCOB, a soft-core for the blowfish cryptographic algorithm
SBCCI'99 Proceedings of the XIIth conference on Integrated circuits and systems design
Generic attacks on misty schemes
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
Pseudorandomness analysis of the (extended) Lai-Massey scheme
Information Processing Letters
PRADA: a high-performance reconfigurable parallel architecture based on the dataflow model
International Journal of High Performance Systems Architecture
On Lai---Massey and quasi-Feistel ciphers
Designs, Codes and Cryptography
Enhancing the performance of symmetric-key cryptography via instruction set extensions
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
The design of cryptographic S-boxes using CSPs
CP'11 Proceedings of the 17th international conference on Principles and practice of constraint programming
FOX: a new family of block ciphers
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
A related-key rectangle attack on the full KASUMI
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
The ANF of the composition of addition and multiplication mod 2n
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
New combined attacks on block ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
New attacks against reduced-round versions of IDEA
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Related-Key boomerang and rectangle attacks
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Improved cryptanalysis of the FOX block cipher
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Integral cryptanalysis of reduced FOX block cipher
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Practical attack on the full MMB block cipher
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Efficient and optimally secure key-length extension for block ciphers via randomized cascading
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Journal of Real-Time Image Processing
Compact implementation and performance evaluation of block ciphers in ATtiny devices
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
A Novel Color Image Hiding Scheme Using Block Truncation Coding
Fundamenta Informaticae
Secure Dynamic Access Control Scheme of PHR in Cloud Computing
Journal of Medical Systems
GPU-Acceleration of block ciphers in the OpenSSL cryptographic library
ISC'12 Proceedings of the 15th international conference on Information Security
Practical cryptanalysis of ARMADILL02
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
On the (in)security of IDEA in various hashing modes
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Efficient and provably secure methods for switching from arithmetic to boolean masking
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Collisions for the WIDEA-8 compression function
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Secure multiple SBoxes implementation with arithmetically masked input
CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
Hi-index | 0.02 |
A new secret-key block cipher is proposed as a candidate for a new encryption standard. In the proposed cipher, the plaintext and the ciphertext are 64 bit blocks, while the secret key is 128 bit long. The cipher is based on the design concept of "mixing operations from different algebraic groups". The cipher structure was chosen to provide confusion and diffusion and to facilitate both hardware and software implementations.