A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments

JH Kong, LM Ang, KP Seng - Journal of Network and Computer …, 2015 - Elsevier
Modern cryptographic algorithms play an irreplaceable role in data communication systems
for various areas of applications. These algorithms are the backbone of data protection and …

A hardware implementation of ZUC-256 stream cipher

Y Wang, L Wu, X Zhang, K Xu… - 2020 IEEE 14th …, 2020 - ieeexplore.ieee.org
In this paper, we present a hardware implementation of ZUC-256 stream cipher. ZUC-256 is
developed from ZUC-128 to provide higher 256-bit security for 5G communication. The …

Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA

L Zhang, L Xia, Z Liu, J Jing… - 2012 IEEE 11th …, 2012 - ieeexplore.ieee.org
SNOW 3G and ZUC are both the heart of secure algorithm sets in 3GPP LTE-Advanced,
which is the potential candidate for 4G mobile broadband communication standard. In this …

Optimized implementations for ZUC-256 on FPGA

Y Yang, W Zhao, L Xiong, N Wang, Y Ma - Wireless Personal …, 2021 - Springer
ZUC-128 algorithm was listed as the core part in the third international encryption and
integrity protection algorithms, EEA3 and EIA3 in 4G-LTE mobile communication system by …

A novel pipelining encryption hardware system with high throughput and high integration for 5G

Y Liu, Z Shen, S Fang, Y Wang - China Communications, 2022 - ieeexplore.ieee.org
This paper presents a ZUC-256 stream cipher algorithm hardware system in order to prevent
the advanced security threats for 5G wireless network. The main innovation of the hardware …

Power analysis and optimization of the ZUC stream cipher for LTE-advanced mobile terminals

S Traboulsi, N Pohl, J Hausner, A Bilgic… - 2012 IEEE 3rd Latin …, 2012 - ieeexplore.ieee.org
In this paper we devise and compare several hardware implementations of the
confidentiality algorithm that is based on the ZUC stream cipher. First we design and …

HPAZ: A high-throughput pipeline architecture of ZUC in hardware

Z Liu, Q Zhang, C Ma, C Li, J Jing - 2016 Design, Automation & …, 2016 - ieeexplore.ieee.org
In this paper, we propose a high-throughput pipeline architecture of the stream cipher ZUC
which has been included in the security portfolio of 3GPP LTE-Advanced. In the literature …

Fast constant time implementations of ZUC-256 on x86 CPUs

N Drucker, S Gueron - 2019 16th IEEE Annual Consumer …, 2019 - ieeexplore.ieee.org
ZUC-256 is a Pseudo Random Number Generator (PRNG) that is proposed as a successor
of ZUC-128. Similarly to ZUC-128 that is incorporated in the 128-EEA3 and 128-EIA3 …

A high-throughput hardware implementation of ZUC-256 stream cipher

A Xu, Y Wu, J Yang, M Zhu, Q Zhao… - 2022 4th International …, 2022 - ieeexplore.ieee.org
The ZUC-256 stream cipher algorithm has been incorporated into the security portfolio of
3GPP LTE-Advanced. Therefore, it is important to study its high-performance …

Faster 128-EEA3 and 128-EIA3 software

R Avanzi, BB Brumley - … Security: 16th International Conference, ISC 2013 …, 2015 - Springer
Abstract The 3GPP Task Force recently supplemented mobile LTE network security with an
additional set of confidentiality and integrity algorithms, namely 128-EEA3 and 128-EIA3 …