Sciweavers

386 search results - page 12 / 78
» The Block Cipher Rijndael
Sort
View
DSD
2008
IEEE
84views Hardware» more  DSD 2008»
14 years 5 months ago
A Hardware Implementation of CURUPIRA Block Cipher for Wireless Sensors
An architecture and VLSI implementation of a new block cipher called Curupira is presented in this paper. This cipher is suitable for wireless sensors and RFID applications. Our 0...
Paris Kitsos, George N. Selimis, Odysseas G. Koufo...
AES
2000
Springer
96views Cryptology» more  AES 2000»
14 years 3 months ago
Performance of the AES Candidate Algorithms in Java
We analyze the five remaining AES candidate algorithms MARS, RC6, Rijndael, Serpent, and Twofish as well as DES, Triple DES, and IDEA by examining independently developed Java imp...
Andreas Sterbenz, Peter Lipp
CISC
2009
Springer
181views Cryptology» more  CISC 2009»
13 years 8 months ago
Cryptanalysis of the ESSENCE Family of Hash Functions
Abstract. ESSENCE is a family of cryptographic hash functions, accepted to the first round of NIST's SHA-3 competition. This paper presents the first known attacks on ESSENCE....
Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson...
CHES
2006
Springer
81views Cryptology» more  CHES 2006»
14 years 2 months ago
Template Attacks in Principal Subspaces
Side-channel attacks are a serious threat to implementations of cryptographic algorithms. Secret information is recovered based on power consumption, electromagnetic emanations or ...
Cédric Archambeau, Eric Peeters, Fran&ccedi...
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
14 years 3 months ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi