[BOOK][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
[BOOK][B] The design of Rijndael
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
[PDF][PDF] AES Proposal: Rijndael
J Daemen - 1999 - git.nicco.io
In this document we describe the cipher Rijndael. First we present the mathematical basis
necessary for understanding the specifications followed by the design rationale and the …
necessary for understanding the specifications followed by the design rationale and the …
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
This paper presents a block cipher that is optimized with respect to latency when
implemented in hardware. Such ciphers are desirable for many future pervasive applications …
implemented in hardware. Such ciphers are desirable for many future pervasive applications …
The block cipher Square
In this paper we present a new 128-bit block cipher called Square. The original design of
Square concentrates on the resistance against differential and linear cryptanalysis …
Square concentrates on the resistance against differential and linear cryptanalysis …
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our
information infrastructure. In this paper, we provide the specification of Ascon-128 and …
information infrastructure. In this paper, we provide the specification of Ascon-128 and …
SIT: a lightweight encryption algorithm for secure internet of things
The Internet of Things (IoT) being a promising technology of the future is expected to
connect billions of devices. The increased number of communication is expected to …
connect billions of devices. The increased number of communication is expected to …
[PDF][PDF] Twofish: A 128-bit block cipher
Twofish is a 128-bit block cipher that accepts a variable-length key up to 256 bits. The cipher
is a 16-round Feistel network with a bijective F function made up of four key-dependent 8-by …
is a 16-round Feistel network with a bijective F function made up of four key-dependent 8-by …
The block cipher Rijndael
LNCS 1820 - The Block Cipher Rijndael Page 1 The Block Cipher Rijndael Joan Daemen1
and Vincent Rijmen⋆2 1 Proton World Int’l Zweefvliegtuigstraat 10 B-1130 Brussel, Belgium …
and Vincent Rijmen⋆2 1 Proton World Int’l Zweefvliegtuigstraat 10 B-1130 Brussel, Belgium …