Sciweavers

381 search results - page 10 / 77
» Tweakable Block Ciphers
Sort
View
DSD
2008
IEEE
84views Hardware» more  DSD 2008»
14 years 2 months ago
A Hardware Implementation of CURUPIRA Block Cipher for Wireless Sensors
An architecture and VLSI implementation of a new block cipher called Curupira is presented in this paper. This cipher is suitable for wireless sensors and RFID applications. Our 0...
Paris Kitsos, George N. Selimis, Odysseas G. Koufo...
ACNS
2006
Springer
241views Cryptology» more  ACNS 2006»
14 years 6 days ago
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive
In this paper we combine the error correction and encryption functionality into one block cipher, which we call High Diffusion (HD) cipher. The error correcting property of this ci...
Chetan Nanjunda Mathur, Karthik Narayan, K. P. Sub...
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
14 years 1 months ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi
FSE
2001
Springer
109views Cryptology» more  FSE 2001»
14 years 28 days ago
Bias in the LEVIATHAN Stream Cipher
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and proportional effort; both arise from compression within the ci...
Paul Crowley, Stefan Lucks
CRYPTO
1993
Springer
131views Cryptology» more  CRYPTO 1993»
14 years 16 days ago
Hash Functions Based on Block Ciphers: A Synthetic Approach
Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length of the block cipher and where the key size is appro...
Bart Preneel, René Govaerts, Joos Vandewall...