A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments

JH Kong, LM Ang, KP Seng - Journal of Network and Computer …, 2015 - Elsevier
Modern cryptographic algorithms play an irreplaceable role in data communication systems
for various areas of applications. These algorithms are the backbone of data protection and …

[KİTAP][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

[HTML][HTML] The 128-bit blockcipher CLEFIA

M Katagi, S Moriai - 2011 - rfc-editor.org
RFC 6114: The 128-Bit Blockcipher CLEFIA [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info
page] INFORMATIONAL Independent Submission M. Katagi Request for Comments: 6114 S …

Block Ciphers – Focus on the Linear Layer (feat. PRIDE)

MR Albrecht, B Driessen, EB Kavun, G Leander… - Advances in Cryptology …, 2014 - Springer
The linear layer is a core component in any substitution-permutation network block cipher.
Its design significantly influences both the security and the efficiency of the resulting block …

[KİTAP][B] The block cipher companion

LR Knudsen, M Robshaw - 2011 - books.google.com
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the
action of a secret key, and the process of encryption is reversed by decryption which uses …

New block cipher: ARIA

D Kwon, J Kim, S Park, SH Sung, Y Sohn… - … on information security …, 2003 - Springer
In this paper, we propose a 128-bit block cipher ARIA which is an involution substitution and
permutation encryption network (SPN). We use the same S-boxes as Rijndael to eliminate …

[PDF][PDF] The Khazad legacy-level block cipher

P Barreto, V Rijmen - Primitive submitted to NESSIE, 2000 - researchgate.net
Khazad is a 64-bit (legacy-level) block cipher that accepts a 128-bit key. The cipher is a
uniform substitution-permutation network whose inverse only differs from the forward …

Optimizing implementations of lightweight building blocks

J Jean, T Peyrin, SM Sim, J Tourteaux - Cryptology ePrint Archive, 2017 - eprint.iacr.org
We study the synthesis of small functions used as building blocks in lightweight
cryptographic designs in terms of hardware implementations. This phase most notably …

Lightweight MDS involution matrices

SM Sim, K Khoo, F Oggier, T Peyrin - … FSE 2015, Istanbul, Turkey, March 8 …, 2015 - Springer
In this article, we provide new methods to look for lightweight MDS matrices, and in
particular involutory ones. By proving many new properties and equivalence classes for …

Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, Camellia, Khazad and others

A Biryukov, I Nikolić - Annual International Conference on the Theory and …, 2010 - Springer
While differential behavior of modern ciphers in a single secret key scenario is relatively well
understood, and simple techniques for computation of security lower bounds are readily …