[BOOK][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[BOOK][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

[PDF][PDF] AES Proposal: Rijndael

J Daemen - 1999 - git.nicco.io
In this document we describe the cipher Rijndael. First we present the mathematical basis
necessary for understanding the specifications followed by the design rationale and the …

PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications

J Borghoff, A Canteaut, T Güneysu, EB Kavun… - Advances in Cryptology …, 2012 - Springer
This paper presents a block cipher that is optimized with respect to latency when
implemented in hardware. Such ciphers are desirable for many future pervasive applications …

The block cipher Square

J Daemen, L Knudsen, V Rijmen - … , FSE'97 Haifa, Israel, January 20–22 …, 1997 - Springer
In this paper we present a new 128-bit block cipher called Square. The original design of
Square concentrates on the resistance against differential and linear cryptanalysis …

Ascon v1.2: Lightweight Authenticated Encryption and Hashing

C Dobraunig, M Eichlseder, F Mendel, M Schläffer - Journal of Cryptology, 2021 - Springer
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our
information infrastructure. In this paper, we provide the specification of Ascon-128 and …

SIT: a lightweight encryption algorithm for secure internet of things

M Usman, I Ahmed, MI Aslam, S Khan… - arxiv preprint arxiv …, 2017 - arxiv.org
The Internet of Things (IoT) being a promising technology of the future is expected to
connect billions of devices. The increased number of communication is expected to …

[PDF][PDF] Twofish: A 128-bit block cipher

B Schneier, J Kelsey, D Whiting, D Wagner… - NIST AES …, 1998 - karlin.mff.cuni.cz
Twofish is a 128-bit block cipher that accepts a variable-length key up to 256 bits. The cipher
is a 16-round Feistel network with a bijective F function made up of four key-dependent 8-by …

The block cipher Rijndael

J Daemen, V Rijmen - International Conference on Smart Card Research …, 1998 - Springer
LNCS 1820 - The Block Cipher Rijndael Page 1 The Block Cipher Rijndael Joan Daemen1
and Vincent Rijmen⋆2 1 Proton World Int’l Zweefvliegtuigstraat 10 B-1130 Brussel, Belgium …

Trivium

C De Canniere, B Preneel - New Stream Cipher Designs: The eSTREAM …, 2008 - Springer
In this chapter, we propose a new stream cipher construction based on block cipher design
principles. The main idea is to replace the building blocks used in block ciphers by …