
PRESENT
 Referenced in 182 articles
[sw08313]
 most compact encryption methods ever designed and is 2.5 times smaller than AES (Advanced Encryption...

NTRU
 Referenced in 186 articles
[sw11761]
 high speed, and low memory requirements. NTRU encryption and decryption use a mixing system suggested...

Camellia
 Referenced in 88 articles
[sw09731]
 same interface specifications as the Advanced Encryption Standard (AES). Efficiency on both software and hardware ... Twofish, Camellia offers at least comparable encryption speed in software and hardware. An optimized implementation ... Camellia in assembly language can encrypt on a Pentium III (800 MHz) at the rate ... hardware design. The hardware design, which includes encryption and decryption and key schedule, occupies approximately...

PRINCE
 Referenced in 69 articles
[sw13240]
 security needs. Our cipher, named PRINCE, allows encryption of data within one clock cycle with ... further requirement is that realizing decryption and encryption results in minimum additional costs. PRINCE ... overhead for decryption on top of encryption is negligible. More precisely for our cipher ... that decryption for one key corresponds to encryption with a related key. This property...

KEMDEM
 Referenced in 60 articles
[sw03093]
 framework. For ISO standards on publickey encryption, Shoup introduced the framework ... formalizing and realizing onedirectional hybrid encryption; KEM is a formalization of asymmetric encryption specified ... formalization of symmetric encryption. This paper investigates a more general hybrid protocol, secure channel, using ... used for multiple bidirectional encrypted transactions in a session. This paper shows that...

Casper
 Referenced in 95 articles
[sw06559]
 overhear or intercept messages, decrypt and encrypt messages with keys that he knows, and fake...

Keccak
 Referenced in 86 articles
[sw09834]
 pseudorandom number generation to authenticated encryption. For a quick introduction, we propose a pseudo...

Serpent
 Referenced in 50 articles
[sw21989]
 Knudsen as a candidate for the Advanced Encryption Standard. It was a finalist ... content ourselves with silver in the `encryption olympics’. Serpent and Rijndael are somewhat similar...

KTANTAN
 Referenced in 60 articles
[sw17437]
 implemented in 462 GE while achieving encryption speed of 12.5 KBit/sec (at 100 KHz). KTANTAN48...

Twofish
 Referenced in 35 articles
[sw13585]
 five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization ... used as the actual encryption key and the other half ... used to modify the encryption algorithm (keydependent Sboxes). Twofish borrows some elements from...

Midori
 Referenced in 35 articles
[sw17436]
 consumed by the circuit per bt in encryption or decryption operation. We deliberate ... added motivation is to make both encryption and decryption functionalities available by small tweak ... circuit that provides both the functionalities of encryption and decryption can be designed with very...

Salsa20
 Referenced in 39 articles
[sw06165]
 Salsa20 encryption function, also known as Snuffle 2005, uses the Salsa20 core to encrypt data...

KATAN
 Referenced in 54 articles
[sw23742]
 solution for lowend devices that need encryption (such as RFID tags...

CRYPTIM
 Referenced in 29 articles
[sw02442]
 CRYPTIM: Graphs as tools for symmetric encryption. A combinatorial method of encryption is presented ... walks of a certain length as encryption tools. We study the quality of such ... encryption in the case of graphs of high girth by comparing the probability to guess...

FLASH
 Referenced in 47 articles
[sw02233]
 European Schemes for Signatures, Integrity, and Encryption), a project within the Information Societies Technology Programme...

LBlock
 Referenced in 47 articles
[sw06569]
 microcontroller requires about 3955 clock cycles to encrypt a plaintext block...

HIGHT
 Referenced in 47 articles
[sw08446]
 also has enough security as a good encryption algorithm. Our hardware implementation of HIGHT requires...

MISTY
 Referenced in 29 articles
[sw24162]
 block encryption algorithm MISTY. We propose secretkey cryptosystems MISTY1 and MISTY2, which are block ... cryptanalysis, and moreover they realize high speed encryption on hardware platforms as well ... shows that MISTY1 with eight rounds can encrypt a data stream in CBC mode...

SKINNY
 Referenced in 33 articles
[sw17435]
 total number of AND/OR/XOR gates used for encryption process). Secondly, we present 𝙼𝙰𝙽𝚃𝙸𝚂, a dedicated ... designing a tweakable block cipher for memory encryption. 𝙼𝙰𝙽𝚃𝙸𝚂 basically reuses well understood, previously studied...

ProVerif
 Referenced in 45 articles
[sw06558]
 primitives, including shared and publickey cryptography (encryption and signatures), hash functions, and DiffieHellman...