• PRESENT

  • Referenced in 161 articles [sw08313]
  • most compact encryption methods ever designed and is 2.5 times smaller than AES (Advanced Encryption...
  • NTRU

  • Referenced in 167 articles [sw11761]
  • high speed, and low memory requirements. NTRU encryption and decryption use a mixing system suggested...
  • Camellia

  • Referenced in 83 articles [sw09731]
  • same interface specifications as the Advanced Encryption Standard (AES). Efficiency on both software and hardware ... Twofish, Camellia offers at least comparable encryption speed in software and hardware. An optimized implementation ... Camellia in assembly language can encrypt on a Pentium III (800 MHz) at the rate ... hardware design. The hardware design, which includes encryption and decryption and key schedule, occupies approximately...
  • KEM-DEM

  • Referenced in 59 articles [sw03093]
  • framework. For ISO standards on public-key encryption, Shoup introduced the framework ... formalizing and realizing one-directional hybrid encryption; KEM is a formalization of asymmetric encryption specified ... formalization of symmetric encryption. This paper investigates a more general hybrid protocol, secure channel, using ... used for multiple bi-directional encrypted transactions in a session. This paper shows that...
  • PRINCE

  • Referenced in 59 articles [sw13240]
  • security needs. Our cipher, named PRINCE, allows encryption of data within one clock cycle with ... further requirement is that realizing decryption and encryption results in minimum additional costs. PRINCE ... overhead for decryption on top of encryption is negligible. More precisely for our cipher ... that decryption for one key corresponds to encryption with a related key. This property...
  • Casper

  • Referenced in 95 articles [sw06559]
  • overhear or intercept messages, decrypt and encrypt messages with keys that he knows, and fake...
  • Keccak

  • Referenced in 72 articles [sw09834]
  • pseudo-random number generation to authenticated encryption. For a quick introduction, we propose a pseudo...
  • Serpent

  • Referenced in 48 articles [sw21989]
  • Knudsen as a candidate for the Advanced Encryption Standard. It was a finalist ... content ourselves with silver in the `encryption olympics’. Serpent and Rijndael are somewhat similar...
  • Twofish

  • Referenced in 35 articles [sw13585]
  • five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization ... used as the actual encryption key and the other half ... used to modify the encryption algorithm (key-dependent S-boxes). Twofish borrows some elements from...
  • KTANTAN

  • Referenced in 56 articles [sw17437]
  • implemented in 462 GE while achieving encryption speed of 12.5 KBit/sec (at 100 KHz). KTANTAN48...
  • KATAN

  • Referenced in 51 articles [sw23742]
  • solution for low-end devices that need encryption (such as RFID tags...
  • Salsa20

  • Referenced in 35 articles [sw06165]
  • Salsa20 encryption function, also known as Snuffle 2005, uses the Salsa20 core to encrypt data...
  • CRYPTIM

  • Referenced in 28 articles [sw02442]
  • CRYPTIM: Graphs as tools for symmetric encryption. A combinatorial method of encryption is presented ... walks of a certain length as encryption tools. We study the quality of such ... encryption in the case of graphs of high girth by comparing the probability to guess...
  • FLASH

  • Referenced in 46 articles [sw02233]
  • European Schemes for Signatures, Integrity, and Encryption), a project within the Information Societies Technology Programme...
  • LBlock

  • Referenced in 43 articles [sw06569]
  • microcontroller requires about 3955 clock cycles to encrypt a plaintext block...
  • HIGHT

  • Referenced in 42 articles [sw08446]
  • also has enough security as a good encryption algorithm. Our hardware implementation of HIGHT requires...
  • MISTY

  • Referenced in 26 articles [sw24162]
  • block encryption algorithm MISTY. We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ... cryptanalysis, and moreover they realize high speed encryption on hardware platforms as well ... shows that MISTY1 with eight rounds can encrypt a data stream in CBC mode...
  • ProVerif

  • Referenced in 41 articles [sw06558]
  • primitives, including shared- and public-key cryptography (encryption and signatures), hash functions, and Diffie-Hellman...
  • Midori

  • Referenced in 24 articles [sw17436]
  • consumed by the circuit per bt in encryption or decryption operation. We deliberate ... added motivation is to make both encryption and decryption functionalities available by small tweak ... circuit that provides both the functionalities of encryption and decryption can be designed with very...
  • ring-LWE

  • Referenced in 27 articles [sw19028]
  • with entirely new applications like fully homomorphic encryption. Unfortunately, realizing the full potential of ring ... cryptosystem and a “somewhat homomorphic” symmetric encryption scheme. Both apply to arbitrary cyclotomics, have tight...