Sciweavers

396 search results - page 12 / 80
» Contemporary Block Ciphers
Sort
View
ISCAS
2008
IEEE
101views Hardware» more  ISCAS 2008»
15 years 10 months ago
High-performance ASIC implementations of the 128-bit block cipher CLEFIA
— In the present paper, we introduce high-performance hardware architectures for the 128-bit block cipher CLEFIA and evaluate their ASIC performances in comparison with the ISO/I...
Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Ak...
ASIACRYPT
2000
Springer
15 years 8 months ago
On the Pseudorandomness of Top-Level Schemes of Block Ciphers
Block ciphers are usually based on one top-level scheme into which we plug “round functions”. To analyze security, it is important to study the intrinsic security provided by t...
Shiho Moriai, Serge Vaudenay
EUROCRYPT
1998
Springer
15 years 8 months ago
Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible
ded abstract appears in Advances in Cryptology
Mihir Bellare, Ted Krovetz, Phillip Rogaway
IJNSEC
2007
253views more  IJNSEC 2007»
15 years 4 months ago
Stream or Block Cipher for Securing VoIP?
When the network is homogeneous, choosing the cipher type for a packet telephony application is simple. It is clear that stream ciphers perform better than block ciphers over land...
Ashraf D. Elbayoumy, Simon J. Shepherd
DCC
2009
IEEE
15 years 11 months ago
On Compression of Data Encrypted with Block Ciphers
This paper investigates compression of encrypted data. It has been previously shown that data encrypted with Vernam’s scheme [1], also known as the one-time pad, can be compress...
Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo...