Sciweavers

461 search results - page 17 / 93
» The RC5 Encryption Algorithm
Sort
View
105
Voted
ISCAS
2006
IEEE
163views Hardware» more  ISCAS 2006»
15 years 7 months ago
ASIC hardware implementation of the IDEA NXT encryption algorithm
— Symmetric-key block ciphers are often used to provide data confidentiality with low complexity, especially in the case of dedicated hardware implementations. IDEA NXT is a nov...
Marco Macchetti, Wenyu Chen
116
Voted
FSE
1998
Springer
137views Cryptology» more  FSE 1998»
15 years 6 months ago
Differential Cryptanalysis of the ICE Encryption Algorithm
ICE is a 64-bit block cipher presented at the Fast Software Encryption Workshop in January 1997. It introduced the concept of a keyed permutation to improve the resistance against ...
Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen
STOC
2010
ACM
226views Algorithms» more  STOC 2010»
15 years 11 months ago
Public-Key Cryptography from Different Assumptions
We construct a new public key encryption based on two assumptions:
Benny Applebaum, Boaz Barak and Avi Wigderson
VLSID
2006
IEEE
144views VLSI» more  VLSID 2006»
16 years 2 months ago
A High-Performance VLSI Architecture for Advanced Encryption Standard (AES) Algorithm
In this paper we present a high-performance, high throughput, and area efficient architecture for the VLSI implementation of the AES algorithm. The subkeys, required for each round...
Naga M. Kosaraju, Murali R. Varanasi, Saraju P. Mo...
82
Voted
ICCD
2001
IEEE
92views Hardware» more  ICCD 2001»
15 years 10 months ago
Performance Impact of Addressing Modes on Encryption Algorithms
A. Murat Fiskiran, Ruby B. Lee