[BOOK][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
[BOOK][B] The design of Rijndael
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
PRESENT: An ultra-lightweight block cipher
With the establishment of the AES the need for new block ciphers has been greatly
diminished; for almost all block cipher applications the AES is an excellent and preferred …
diminished; for almost all block cipher applications the AES is an excellent and preferred …
Poseidon: A new hash function for {Zero-Knowledge} proof systems
The area of practical computational integrity proof systems, like SNARKs, STARKs,
Bulletproofs, is seeing a very dynamic development with several constructions having …
Bulletproofs, is seeing a very dynamic development with several constructions having …
The block cipher Square
In this paper we present a new 128-bit block cipher called Square. The original design of
Square concentrates on the resistance against differential and linear cryptanalysis …
Square concentrates on the resistance against differential and linear cryptanalysis …
SIT: a lightweight encryption algorithm for secure internet of things
The Internet of Things (IoT) being a promising technology of the future is expected to
connect billions of devices. The increased number of communication is expected to …
connect billions of devices. The increased number of communication is expected to …
A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments
JH Kong, LM Ang, KP Seng - Journal of Network and Computer …, 2015 - Elsevier
Modern cryptographic algorithms play an irreplaceable role in data communication systems
for various areas of applications. These algorithms are the backbone of data protection and …
for various areas of applications. These algorithms are the backbone of data protection and …
[PDF][PDF] Twofish: A 128-bit block cipher
Twofish is a 128-bit block cipher that accepts a variable-length key up to 256 bits. The cipher
is a 16-round Feistel network with a bijective F function made up of four key-dependent 8-by …
is a 16-round Feistel network with a bijective F function made up of four key-dependent 8-by …
Integral cryptanalysis
This paper considers a cryptanalytic approach called integral cryptanalysis. It can be seen
as a dual to differential cryptanalysis and applies to ciphers not vulnerable to differential …
as a dual to differential cryptanalysis and applies to ciphers not vulnerable to differential …
Design of symmetric-key primitives for advanced cryptographic protocols
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient
hardware and software implementations, a range of emerging applications using advanced …
hardware and software implementations, a range of emerging applications using advanced …