An application of non-uniform cellular automata for efficient cryptography

A Kumaravel, ON Meetei - 2013 IEEE Conference on …, 2013 - ieeexplore.ieee.org
One of the core issues for robust cryptographic systems is to deal with the rate of diffusion
and distribution of keys. We try to strengthen this aspect by increasing the length of block …

[LLIBRE][B] Криптография: от примитивов к синтезу алгоритмов

НА Молдовян - 2004 - books.google.com
В книге приводятся элементы математических основ криптографии. Раскрывается
содержание симметричных и асимметричных шифров, систем цифровой электронной …

[LLIBRE][B] Введение в криптосистемы с открытым ключом

НА Молдовян - 2005 - books.google.com
В учебном пособии отражена проблематика современной криптографии, рассмотрена
краткая характеристика современных криптосистем с секретным ключом и специфика …

Twis–a lightweight block cipher

SK Ojha, N Kumar, K Jain, Sangeeta - Information Systems Security: 5th …, 2009 - Springer
A new 128-bit block cipher, TWIS is proposed. It uses key size of 128-bits. The design
targets to software environment for resource constrained applications. It is inspired from …

Mobile systems development: A literature review

JH Hosbond, PA Nielsen - … : Socio-Technical Issues and Challenges: IFIP …, 2005 - Springer
This article reviews 105 representative contributions to the literature on mobile systems
development. The contributions are categorized according to a simple conceptual …

[PDF][PDF] LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption.

S Tripathy, S Nandi - Int. J. Netw. Secur., 2009 - ijns.jalaxy.com.tw
We propose a lightweight block cipher that supports 128-bit block size with 128-, 192-and
256-bit keys, to confirm with the Advanced Encryption Standard (AES) specification. All …

[PDF][PDF] Cryptanalysis of block ciphers

J Lu - 2008 - repository.royalholloway.ac.uk
The block cipher is one of the most important primitives in modern cryptography, information
and network security; one of the primary purposes of such ciphers is to provide …

[PDF][PDF] Novel and efficient cellular automata based symmetric key encryption algorithm for wireless sensor networks

KJJ Kumar, KCK Reddy… - International Journal of …, 2011 - researchgate.net
ABSTRACT Our proposed L2D-CASKE: The lightweight 2-dimensional (2-D) cellular
automata (CA) based symmetric key encryption algorithm of a 128 bit length that accepts a …

On cipher design based on switchable controlled operations

NA Moldovyan - … Network Security: Second International Workshop on …, 2003 - Springer
This paper introduces a new type of primitives called switchable controlled operations
(SCO). The SCO are proposed to be used in the design of the fast ciphers suitable to cheap …

Related-key attack on the MD-64 block cipher suitable for pervasive computing environments

J Kang, K Jeong, SS Yeo, C Lee - 2012 26th International …, 2012 - ieeexplore.ieee.org
MD-64 is a 64-bit block cipher with a 128-bit secret key and is based on data-dependent
operations for the fast hardware performance. MD-64 is suitable to applications in resource …