
Camellia
 Referenced in 88 articles
[sw09731]
 Twofish, Camellia offers at least comparable encryption speed in software and hardware. An optimized implementation ... Camellia in assembly language can encrypt on a Pentium III (800 MHz) at the rate ... second, which is much faster than the speed of an optimized DES implementation. In addition ... hardware design. The hardware design, which includes encryption and decryption and key schedule, occupies approximately...

KTANTAN
 Referenced in 58 articles
[sw17437]
 implemented in 462 GE while achieving encryption speed of 12.5 KBit/sec (at 100 KHz). KTANTAN48...

NTRU
 Referenced in 182 articles
[sw11761]
 easily created keys, high speed, and low memory requirements. NTRU encryption and decryption...

MISTY
 Referenced in 29 articles
[sw24162]
 block encryption algorithm MISTY. We propose secretkey cryptosystems MISTY1 and MISTY2, which are block ... cryptanalysis, and moreover they realize high speed encryption on hardware platforms as well ... rounds can encrypt a data stream in CBC mode at a speed of 20Mbps...

LEA
 Referenced in 6 articles
[sw24781]
 Block Cipher for Fast Encryption on Common Processors. We propose a new block cipher ... size. It provides a highspeed software encryption on generalpurpose processors. Our experiments show...

CASTREAM
 Referenced in 2 articles
[sw15302]
 Theoretically, the cipher operates with an encryption speed of nearly 8 bits per cycle...

AEGIS
 Referenced in 5 articles
[sw13246]
 algorithm. This paper introduces a dedicated authenticated encryption algorithm AEGIS; AEGIS allows for the protection ... Intel Sandy Bridge Core i5 processor, the speed of AEGIS is around 0.7 clock cycles/byte ... comparable in speed to the CTR mode (that offers only encryption) and substantially faster than...

ECC2
 Referenced in 1 article
[sw38273]
 performs pretty well on the speed of both encryption and decryption. The use of algebraic...

Minalpher
 Referenced in 10 articles
[sw40314]
 algorithm submitted to CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness) as a candidate ... Especially, the algorithm is suitable for highspeed hardware implementation by utilizing its parallel operating...

OTRU
 Referenced in 3 articles
[sw32108]
 OTRU, a high speed probabilistic multidimensional public key cryptosystem that encrypts eight data vectors ... provide the details of the key generation, encryption and decryption algorithms and discuss the issues ... techniques we can increase the OTRU encryption/decryption speed to a level even higher than Ntru...

QCLDPC
 Referenced in 10 articles
[sw03246]
 level. We analyze the complexity of the encryption and decryption stages by adopting efficient algorithms ... convolution are considered, that give a significant speedup in the cryptosystem operations...

CBEAM
 Referenced in 3 articles
[sw15633]
 CBEAM: efficient authenticated encryption from feebly oneway φ functions. We show how efficient ... sliced software implementation offers not only comparable speeds to AES but also increased security against ... attacks. Our construction supports spongebased authenticated encryption, hashing, and PRF/PRNG modes and is highly...

NTRUEncrypt
 Referenced in 8 articles
[sw14148]
 Speed records for NTRU. In this paper NTRUEncrypt is implemented for the first time ... throughput of up to 200 000 encryptions per second can be reached at a security...

DNSCurve
 Referenced in 1 article
[sw22847]
 Usable security for DNS. DNSCurve uses highspeed highsecurity ellipticcurve cryptography to drastically ... attacker who cares to look. DNSCurve encrypts all DNS packets. Integrity: DNS today uses ... randomization” and ”TXID randomization” to create some speed bumps for blind attackers, but patient attackers ... part of a larger project to encrypt and authenticate all Internet packets. The techniques used...

MaTRU
 Referenced in 8 articles
[sw11763]
 ring with a different linear transformation for encryption and decryption. In particular, it operates ... linear transformation in MaTRU leads to respectable speed improvements by a factor...

BOTRU
 Referenced in 1 article
[sw40172]
 Design of an alternative NTRU encryption with high secure and efficient. With the need ... reveals that the BOTRU has a higher speed than the OTRU...

eBATS
 Referenced in 5 articles
[sw13007]
 fast are these systems? How do the speeds vary among Pentium, PowerPC, etc.? How much ... publickeysignature software, publickeyencryption software, and publickeysecretsharing software. Submitted...

nDPI
 Referenced in 0 articles
[sw35499]
 nDPI: Opensource highspeed deep packet inspection. Network traffic analysis was traditionally limited ... portindependent, peertopeer, and encrypted protocols, the task of identifying application protocols became...

gmp
 Referenced in 282 articles
[sw00363]
 GMP is a free library for arbitrary precision...

Maple
 Referenced in 5369 articles
[sw00545]
 The result of over 30 years of cutting...