• Camellia

  • Referenced in 88 articles [sw09731]
  • Twofish, Camellia offers at least comparable encryption speed in software and hardware. An optimized implementation ... Camellia in assembly language can encrypt on a Pentium III (800 MHz) at the rate ... second, which is much faster than the speed of an optimized DES implementation. In addition ... hardware design. The hardware design, which includes encryption and decryption and key schedule, occupies approximately...
  • KTANTAN

  • Referenced in 58 articles [sw17437]
  • implemented in 462 GE while achieving encryption speed of 12.5 KBit/sec (at 100 KHz). KTANTAN48...
  • NTRU

  • Referenced in 182 articles [sw11761]
  • easily created keys, high speed, and low memory requirements. NTRU encryption and decryption...
  • MISTY

  • Referenced in 29 articles [sw24162]
  • block encryption algorithm MISTY. We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ... cryptanalysis, and moreover they realize high speed encryption on hardware platforms as well ... rounds can encrypt a data stream in CBC mode at a speed of 20Mbps...
  • LEA

  • Referenced in 6 articles [sw24781]
  • Block Cipher for Fast Encryption on Common Processors. We propose a new block cipher ... size. It provides a high-speed software encryption on general-purpose processors. Our experiments show...
  • CASTREAM

  • Referenced in 2 articles [sw15302]
  • Theoretically, the cipher operates with an encryption speed of nearly 8 bits per cycle...
  • AEGIS

  • Referenced in 5 articles [sw13246]
  • algorithm. This paper introduces a dedicated authenticated encryption algorithm AEGIS; AEGIS allows for the protection ... Intel Sandy Bridge Core i5 processor, the speed of AEGIS is around 0.7 clock cycles/byte ... comparable in speed to the CTR mode (that offers only encryption) and substantially faster than...
  • ECC2

  • Referenced in 1 article [sw38273]
  • performs pretty well on the speed of both encryption and decryption. The use of algebraic...
  • Minalpher

  • Referenced in 10 articles [sw40314]
  • algorithm submitted to CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness) as a candidate ... Especially, the algorithm is suitable for high-speed hardware implementation by utilizing its parallel operating...
  • OTRU

  • Referenced in 3 articles [sw32108]
  • OTRU, a high speed probabilistic multi-dimensional public key cryptosystem that encrypts eight data vectors ... provide the details of the key generation, encryption and decryption algorithms and discuss the issues ... techniques we can increase the OTRU encryption/decryption speed to a level even higher than Ntru...
  • QC-LDPC

  • Referenced in 10 articles [sw03246]
  • level. We analyze the complexity of the encryption and decryption stages by adopting efficient algorithms ... convolution are considered, that give a significant speed-up in the cryptosystem operations...
  • CBEAM

  • Referenced in 3 articles [sw15633]
  • CBEAM: efficient authenticated encryption from feebly one-way φ functions. We show how efficient ... sliced software implementation offers not only comparable speeds to AES but also increased security against ... attacks. Our construction supports sponge-based authenticated encryption, hashing, and PRF/PRNG modes and is highly...
  • NTRUEncrypt

  • Referenced in 8 articles [sw14148]
  • Speed records for NTRU. In this paper NTRUEncrypt is implemented for the first time ... throughput of up to 200 000 encryptions per second can be reached at a security...
  • DNSCurve

  • Referenced in 1 article [sw22847]
  • Usable security for DNS. DNSCurve uses high-speed high-security elliptic-curve cryptography to drastically ... attacker who cares to look. DNSCurve encrypts all DNS packets. Integrity: DNS today uses ... randomization” and ”TXID randomization” to create some speed bumps for blind attackers, but patient attackers ... part of a larger project to encrypt and authenticate all Internet packets. The techniques used...
  • MaTRU

  • Referenced in 8 articles [sw11763]
  • ring with a different linear transformation for encryption and decryption. In particular, it operates ... linear transformation in MaTRU leads to respectable speed improvements by a factor...
  • BOTRU

  • Referenced in 1 article [sw40172]
  • Design of an alternative NTRU encryption with high secure and efficient. With the need ... reveals that the BOTRU has a higher speed than the OTRU...
  • eBATS

  • Referenced in 5 articles [sw13007]
  • fast are these systems? How do the speeds vary among Pentium, PowerPC, etc.? How much ... public-key-signature software, public-key-encryption software, and public-key-secret-sharing software. Submitted...
  • nDPI

  • Referenced in 0 articles [sw35499]
  • nDPI: Open-source high-speed deep packet inspection. Network traffic analysis was traditionally limited ... port-independent, peer-to-peer, and encrypted protocols, the task of identifying application protocols became...
  • gmp

  • Referenced in 282 articles [sw00363]
  • GMP is a free library for arbitrary precision...
  • Maple

  • Referenced in 5369 articles [sw00545]
  • The result of over 30 years of cutting...