• PRESENT

  • Referenced in 182 articles [sw08313]
  • most compact encryption methods ever designed and is 2.5 times smaller than AES (Advanced Encryption...
  • NTRU

  • Referenced in 186 articles [sw11761]
  • high speed, and low memory requirements. NTRU encryption and decryption use a mixing system suggested...
  • Camellia

  • Referenced in 88 articles [sw09731]
  • same interface specifications as the Advanced Encryption Standard (AES). Efficiency on both software and hardware ... Twofish, Camellia offers at least comparable encryption speed in software and hardware. An optimized implementation ... Camellia in assembly language can encrypt on a Pentium III (800 MHz) at the rate ... hardware design. The hardware design, which includes encryption and decryption and key schedule, occupies approximately...
  • PRINCE

  • Referenced in 69 articles [sw13240]
  • security needs. Our cipher, named PRINCE, allows encryption of data within one clock cycle with ... further requirement is that realizing decryption and encryption results in minimum additional costs. PRINCE ... overhead for decryption on top of encryption is negligible. More precisely for our cipher ... that decryption for one key corresponds to encryption with a related key. This property...
  • KEM-DEM

  • Referenced in 60 articles [sw03093]
  • framework. For ISO standards on public-key encryption, Shoup introduced the framework ... formalizing and realizing one-directional hybrid encryption; KEM is a formalization of asymmetric encryption specified ... formalization of symmetric encryption. This paper investigates a more general hybrid protocol, secure channel, using ... used for multiple bi-directional encrypted transactions in a session. This paper shows that...
  • Casper

  • Referenced in 95 articles [sw06559]
  • overhear or intercept messages, decrypt and encrypt messages with keys that he knows, and fake...
  • Keccak

  • Referenced in 86 articles [sw09834]
  • pseudo-random number generation to authenticated encryption. For a quick introduction, we propose a pseudo...
  • Serpent

  • Referenced in 50 articles [sw21989]
  • Knudsen as a candidate for the Advanced Encryption Standard. It was a finalist ... content ourselves with silver in the `encryption olympics’. Serpent and Rijndael are somewhat similar...
  • KTANTAN

  • Referenced in 60 articles [sw17437]
  • implemented in 462 GE while achieving encryption speed of 12.5 KBit/sec (at 100 KHz). KTANTAN48...
  • Twofish

  • Referenced in 35 articles [sw13585]
  • five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization ... used as the actual encryption key and the other half ... used to modify the encryption algorithm (key-dependent S-boxes). Twofish borrows some elements from...
  • Midori

  • Referenced in 35 articles [sw17436]
  • consumed by the circuit per bt in encryption or decryption operation. We deliberate ... added motivation is to make both encryption and decryption functionalities available by small tweak ... circuit that provides both the functionalities of encryption and decryption can be designed with very...
  • Salsa20

  • Referenced in 39 articles [sw06165]
  • Salsa20 encryption function, also known as Snuffle 2005, uses the Salsa20 core to encrypt data...
  • KATAN

  • Referenced in 54 articles [sw23742]
  • solution for low-end devices that need encryption (such as RFID tags...
  • CRYPTIM

  • Referenced in 29 articles [sw02442]
  • CRYPTIM: Graphs as tools for symmetric encryption. A combinatorial method of encryption is presented ... walks of a certain length as encryption tools. We study the quality of such ... encryption in the case of graphs of high girth by comparing the probability to guess...
  • FLASH

  • Referenced in 47 articles [sw02233]
  • European Schemes for Signatures, Integrity, and Encryption), a project within the Information Societies Technology Programme...
  • LBlock

  • Referenced in 47 articles [sw06569]
  • microcontroller requires about 3955 clock cycles to encrypt a plaintext block...
  • HIGHT

  • Referenced in 47 articles [sw08446]
  • also has enough security as a good encryption algorithm. Our hardware implementation of HIGHT requires...
  • MISTY

  • Referenced in 29 articles [sw24162]
  • block encryption algorithm MISTY. We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ... cryptanalysis, and moreover they realize high speed encryption on hardware platforms as well ... shows that MISTY1 with eight rounds can encrypt a data stream in CBC mode...
  • SKINNY

  • Referenced in 33 articles [sw17435]
  • total number of AND/OR/XOR gates used for encryption process). Secondly, we present 𝙼𝙰𝙽𝚃𝙸𝚂, a dedicated ... designing a tweakable block cipher for memory encryption. 𝙼𝙰𝙽𝚃𝙸𝚂 basically reuses well understood, previously studied...
  • ProVerif

  • Referenced in 45 articles [sw06558]
  • primitives, including shared- and public-key cryptography (encryption and signatures), hash functions, and Diffie-Hellman...