Quark: A Lightweight Hash

JP Aumasson, L Henzen, W Meier… - … and embedded systems, 2010 - Springer
The need for lightweight cryptographic hash functions has been repeatedly expressed by
application designers, notably for implementing RFID protocols. However not many designs …

A new framework for RFID privacy

RH Deng, Y Li, M Yung, Y Zhao - European Symposium on Research in …, 2010 - Springer
Formal RFID security and privacy frameworks are fundamental to the design and analysis of
robust RFID systems. In this paper, we develop a new definitional framework for RFID …

ARMADILLO: a multi-purpose cryptographic primitive dedicated to hardware

S Badel, N Dağtekin, J Nakahara Jr, K Ouafi… - … and Embedded Systems, 2010 - Springer
This paper describes and analyzes the security of a general-purpose cryptographic function
design, with application in RFID tags and sensor networks. Based on these analyzes, we …

Greedy distinguishers and nonrandomness detectors

P Stankovski - Progress in Cryptology-INDOCRYPT 2010: 11th …, 2010 - Springer
We present the concept of greedy distinguishers and show how some simple observations
and the well known greedy heuristic can be combined into a very powerful strategy (the …

Algebraic, AIDA/cube and side channel analysis of KATAN family of block ciphers

GV Bard, NT Courtois, J Nakahara… - Progress in Cryptology …, 2010 - Springer
This paper presents the first results on AIDA/cube, algebraic and side-channel attacks on
variable number of rounds of all members of the KATAN family of block ciphers. Our cube …

Finding matching initial states for equivalent NLFSRs in the Fibonacci and the Galois configurations

E Dubrova - IEEE transactions on information theory, 2010 - ieeexplore.ieee.org
The Fibonacci and the Galois configurations of nonlinear feedback shift registers (NLFSRs)
are considered. In the former, the feedback is applied to the input bit of the shift register only …

Lightweight privacy preserving authentication for RFID using a stream cipher

O Billet, J Etrog, H Gilbert - … 17th International Workshop, FSE 2010, Seoul …, 2010 - Springer
In this paper, a privacy preserving authentication protocol for RFID that relies on a single
cryptographic component, a lightweight stream cipher, is constructed. The goal is to provide …

An improved hardware implementation of the grain stream cipher

SS Mansouri, E Dubrova - 2010 13th Euromicro Conference on …, 2010 - ieeexplore.ieee.org
A common approach to protect confidential information is to use a stream cipher which
combines plain text bits with a pseudo-random bit sequence. Among the existing stream …

[图书][B] Analysis and design of block cipher constructions

A Bogdanov - 2010 - Citeseer
This thesis is dedicated to symmetric cryptographic algorithms. The major focus of the work
is on block ciphers themselves as well as on hash functions and message authentication …

On the security of NOEKEON against side channel cube attacks

SF Abdul-Latip, MR Reyhanitabar, W Susilo… - … Security, Practice and …, 2010 - Springer
In this paper, we investigate the security of the NOEKEON block cipher against side channel
cube attacks. NOEKEON was proposed by Daemen et al. for the NESSIE project. The block …