Sciweavers

378 search results - page 25 / 76
» A Traceable Block Cipher
Sort
View
ASIACRYPT
2007
Springer
14 years 23 days ago
On Efficient Message Authentication Via Block Cipher Design Techniques
In an effort to design a MAC scheme that is built using block cipher components and runs faster than the modes of operation for message authentication, Daemen and Rijmen have propo...
Goce Jakimoski, K. P. Subbalakshmi
ARC
2009
Springer
241views Hardware» more  ARC 2009»
14 years 3 months ago
Fully Pipelined Hardware Implementation of 128-Bit SEED Block Cipher Algorithm
As the need for information security increases in our everyday life, the job of encoding/decoding for secure information delivery becomes a critical issue in data network systems. ...
Jaeyoung Yi, Karam Park, Joonseok Park, Won Woo Ro
CISC
2006
Springer
106views Cryptology» more  CISC 2006»
14 years 15 days ago
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
This work builds on earlier work by Rogaway at Asiacrypt 2004 on tweakable block cipher (TBC) and modes of operations. Our first contribution is to generalize Rogaway's TBC co...
Debrup Chakraborty, Palash Sarkar
DAC
2001
ACM
14 years 9 months ago
Concurrent Error Detection of Fault-Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers
: Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concu...
Ramesh Karri, Kaijie Wu, Piyush Mishra, Yongkook K...
CANS
2009
Springer
150views Cryptology» more  CANS 2009»
14 years 3 months ago
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
Jorge Nakahara, Pouyan Sepehrdad, Bingsheng Zhang,...