• KATAN

  • Referenced in 54 articles [sw23742]
  • devices that need encryption (such as RFID tags...
  • KTANTAN

  • Referenced in 60 articles [sw17437]
  • implemented in 462 GE while achieving encryption speed of 12.5 KBit/sec (at 100 KHz). KTANTAN48 ... which is the version we recommend for RFID tags uses 588 GE, whereas KATAN64...
  • HIGHT

  • Referenced in 45 articles [sw08446]
  • sensor in USN or a RFID tag. HIGHT does not only consist of simple operations ... also has enough security as a good encryption algorithm. Our hardware implementation of HIGHT requires...
  • ARMADILLO

  • Referenced in 6 articles [sw08371]
  • purpose cryptographic function design, with application in RFID tags and sensor networks. Based on these ... hash 48 bits, or encrypt 128 bits on RFID tags. A better tradeoff would ... cycles for the same, to hash (resp. encrypt) at a rate of 1.1 Mbps (resp...
  • mCrypton

  • Referenced in 19 articles [sw09729]
  • constrained tiny devices, such as low-cost RFID tags and sensors. It’s designed ... about 3500 to 4100 gates for both encryption and decryption, and about ... gates for encryption only (under 0.13μm CMOS technology). The result shows that the hardware ... within an economic range of low-cost RFID tags and sensors. A more compact implementation...
  • EPCBC

  • Referenced in 6 articles [sw11640]
  • Electronic Product Code (EPC) encryption, which uses low-cost passive RFID-tags and exactly ... would be the most efficient at EPC encryption, since for other ciphers such...
  • NOEKEON

  • Referenced in 25 articles [sw09730]
  • constrained devices like radio-frequency identification (RFID) tags or sensor nodes where chip area ... interface for communication, and support encryption as well as decryption operation. We give results...
  • Quark

  • Referenced in 22 articles [sw08447]
  • professionals, notably to implement cryptographic protocols in RFID technology. At the time of writing, however ... used for message authentication, stream encryption, or authenticated encryption. Our hardware evaluation shows that Quark...
  • FGb

  • Referenced in 247 articles [sw00286]
  • FGb/Gb libraryGb is a program (191 420 lines...
  • Magma

  • Referenced in 3315 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • Matlab

  • Referenced in 13544 articles [sw00558]
  • MATLAB® is a high-level language and interactive...
  • HMQV

  • Referenced in 80 articles [sw02714]
  • The MQV protocol of Law, Menezes, Qu, Solinas...
  • Knapsack

  • Referenced in 488 articles [sw04723]
  • Knapsack problems are the simplest NP-hard problems...
  • Trivium

  • Referenced in 79 articles [sw06150]
  • TRIVIUM is a hardware oriented synchronous stream cipher...
  • PRESENT

  • Referenced in 179 articles [sw08313]
  • PRESENT is a new ultra lightweight block cipher...
  • spongent

  • Referenced in 21 articles [sw08445]
  • spongent: A Lightweight Hash Function. This paper proposes...
  • KLEIN

  • Referenced in 20 articles [sw09457]
  • KLEIN: A New Family of Lightweight Block Ciphers...
  • MICKEY

  • Referenced in 22 articles [sw09741]
  • The MICKEY Stream Ciphers. The family of stream...
  • NTRU

  • Referenced in 182 articles [sw11761]
  • NTRU: A ring-based public key cryptosystem. We...
  • eSTREAM

  • Referenced in 105 articles [sw12699]
  • Welcome to the home page of eSTREAM, the...