On efficient message authentication via block cipher design techniques

G Jakimoski, KP Subbalakshmi - … on the Theory and Application of …, 2007 - Springer
In an effort to design a MAC scheme that is built using block cipher components and runs
faster than the modes of operation for message authentication, Daemen and Rijmen have …

Cryptographic properties and application of a generalized unbalanced Feistel network structure

J Choy, G Chew, K Khoo, H Yap - Cryptography and Communications, 2011 - Springer
In this paper, we study GF-NLFSR, a Generalized Unbalanced Feistel Network (GUFN)
which can be considered as an extension of the outer function FO of the KASUMI block …

Low power/high speed optimization approaches of MISTY algorithm

A Rjoub, EM Ghabashneh - 2016 5th International Conference …, 2016 - ieeexplore.ieee.org
This paper presents two approaches targeting the reduction of power dissipation, the delay
time and silicon area of S7 and S9 blocks of MISTY1 encryption algorithm. The essential part …

Compact hardware implementations of MISTY1 block cipher

Yasir, N Wu, X Zhang - Journal of Circuits, Systems and Computers, 2018 - World Scientific
This paper proposes compact hardware implementations of 64-bit NESSIE proposed
MISTY1 block cipher for area constrained and low power ASIC applications. The …

[图书][B] Securitatea Informatiei vol 2 (Protocoale de securitate)

A Atanasiu - 2009 - researchgate.net
Scrierea unei continuari la primul volum de securitate a informatiei (dedicat sistemelor de
criptare) se impunea de la sine: domeniul este mult mai vast decât o simpla trecere ın …

[图书][B] Analysis and design of block ciphers

AM Youssef - 1997 - library-archives.canada.ca
In this thesis we study various cryptographic properties of boolean mappings from n bits to m
bits. In particular, we derive expressions for the expected size of the maximum XOR table …

Approximations of dynamical systems and their applications to cryptography

JM Amigó, J Szczepański - International Journal of Bifurcation and …, 2003 - World Scientific
During the last years a new approach to construct safe block and stream ciphers has been
developed using the theory of dynamical systems. Since a block cryptosystem is generally …

Data transformation apparatus and data transformation method

M Matsui, T Tokita - US Patent 6,201,869, 2001 - Google Patents
Data transformation apparatuses and methods for transform ing two arbitrary pieces of data
of A input data and B input data, wherein a first nonlinear transformation of the A input data …

Information leakage of Feistel ciphers

HM Heys - IEEE Transactions on Information Theory, 2001 - ieeexplore.ieee.org
We examine the information leakage between sets of plaintext and ciphertext bits in
symmetric-key block ciphers. The paper demonstrates the effectiveness of information …

DFCv2

L Granboulan, PQ Nguyen, F Noilhan… - … Workshop on Selected …, 2000 - Springer
The development process of the Advanced Encryption Standard (AES) was launched in
1997 by the US government through NIST. The Decorrelated Fast Cipher (DFC) was the …