Sciweavers

34 search results - page 2 / 7
» Perfect Block Ciphers with Small Blocks
Sort
View
IACR
2011
156views more  IACR 2011»
12 years 10 months ago
Fortification of AES with Dynamic Mix-Column Transformation
MDS Matrix has an important role in the design of Rijndael Cipher and is the most expensive component of the cipher. It is also used as a perfect diffusion primitive in some other ...
Ghulam Murtaza, Azhar Ali Khan, Syed Wasi Alam, Aq...
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 11 months ago
Doubly Perfect Nonlinear Boolean Permutations
Due to implementation constraints the XOR operation is widely used in order to combine plaintext and key bit-strings in secretkey block ciphers. This choice directly induces the cl...
Laurent Poinsot
FSE
1993
Springer
101views Cryptology» more  FSE 1993»
14 years 3 months ago
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
: A new non-proprietary secret-key block-enciphering algorithm, SAFER K-64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) is described. The blocklength is 64...
James L. Massey
SACRYPT
2000
Springer
145views Cryptology» more  SACRYPT 2000»
14 years 2 months ago
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis
We present a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e. the same interface specifications as the Advanced...
Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, M...
TIT
2010
130views Education» more  TIT 2010»
13 years 5 months ago
Pseudo-random functions and parallelizable modes of operations of a block cipher
This paper considers the construction and analysis of pseudo-random functions (PRFs) with specific reference to modes of operations of a block cipher. In the context of message aut...
Palash Sarkar