-
Camellia
- Referenced in 88 articles
[sw09731]
- which includes encryption and decryption and key schedule, occupies approximately 11K gates, which...
-
Keccak
- Referenced in 80 articles
[sw09834]
- block cipher without a key schedule. The choice of operations is limited to bitwise...
-
KATAN
- Referenced in 54 articles
[sw23742]
- KTANTAN-n is the key schedule. The resulting ciphers are exteremly efficient in hardware...
-
Twofish
- Referenced in 35 articles
[sw13585]
- boxes, and a relatively complex key schedule. One half...
-
XTEA
- Referenced in 36 articles
[sw36523]
- apparent, including a somewhat more complex key-schedule and a rearrangement of the shifts, XORs...
-
tweakey
- Referenced in 25 articles
[sw12816]
- advances on the topic of secure key schedule design...
-
SAFER
- Referenced in 22 articles
[sw21990]
- number of rounds and the key schedule. More recent versions — SAFER+ and SAFER++ — were submitted...
-
FOX
- Referenced in 22 articles
[sw13586]
- design of strong and efficient key-schedule algorithms. We provide evidence that FOX is immune...
-
CRYPTON
- Referenced in 13 articles
[sw23983]
- some minor weakness in the key schedule and to remove some undesirable properties ... construction and key scheduling. This paper presents the revised version of CRYPTON and its preliminary...
-
EPCBC
- Referenced in 6 articles
[sw11640]
- main cipher structure and customized key schedule design which provides strong protection against related...
-
npuScheduler
- Referenced in 8 articles
[sw25798]
- mode, resource-constrained multi-project scheduling problem. Our key ideas are based on the concepts...
-
CHAM
- Referenced in 2 articles
[sw24780]
- stateless-on-the-fly key schedule which does not require updating a key state. Regarding...
-
ASC-1
- Referenced in 2 articles
[sw19586]
- round keys are generated by a key scheduling algorithm...
-
DBlock
- Referenced in 1 article
[sw13576]
- efficiently improve the diffusion effect. For key schedule of DBlock, it basically employs the same...
-
SAND
- Referenced in 1 article
[sw41021]
- relatively simple key schedule, which makes the ASIC round-based hardware implementation of SAND...
-
GPUTeraSort
- Referenced in 14 articles
[sw12706]
- composed of billions of records and wide keys. Our algorithm uses the data parallelism within ... along with task parallelism by scheduling some of the memory-intensive and compute-intensive threads...
-
GreedEx
- Referenced in 1 article
[sw17812]
- scalable clearing mechanism for utility computing. Scheduling becomes key in dynamic and heterogeneous utility computing...
-
LSSPER
- Referenced in 29 articles
[sw02485]
- search for solving the resource-constrained project scheduling problem (RCPSP). At each step ... seen as a hybrid scheme. The key point of the method deals with the choice...
-
Slurm
- Referenced in 17 articles
[sw25056]
- highly scalable cluster management and job scheduling system for large and small Linux clusters. Slurm ... cluster workload manager, Slurm has three key functions. First, it allocates exclusive and/or non-exclusive...