The design of secure yet efficiently implementable cryptographic algorithms is a fundamental problem of cryptography. Lately, lightweight cryptography--optimizing the …
This textbook serves as an introduction to the subject of embedded systems design, with emphasis on integration of custom hardware components with software. The key problem …
M Knežević, V Nikov, P Rombouts - Cryptographic Hardware and …, 2012 - Springer
The processing time required by a cryptographic primitive implemented in hardware is an important metric for its performance but it has not received much attention in recent …
E Dubrova - IEEE Transactions on Information Theory, 2012 - ieeexplore.ieee.org
A method for constructing n-stage Galois NLFSRs with period 2 n-1 from n-stage maximum length LFSRs is presented. Nonlinearity is introduced into state cycles by adding a nonlinear …
This paper presents a block cipher that is optimized with respect to latency when implemented in hardware. Such ciphers are desirable for many future pervasive applications …
Stream cipher ZUC is the core component in the 3GPP confidentiality and integrity algorithms 128-EEA3 and 128-EIA3. In this paper, we present the details of our differential …
I Dinur, A Shamir - Cryptography and Communications, 2012 - Springer
Cube attacks were introduced in Dinur and Shamir (2009) as a cryptanalytic technique that requires only black box access to the underlying cryptosystem. The attack exploits the …
M Sönmez Turan - Cryptography and Communications, 2012 - Springer
Abstract Linear Feedback Shift Registers (LFSRs) are the main building block of many classical stream ciphers; however due to their inherent linearity, most of the LFSR-based …
Y Tian, G Chen, J Li - J. Comput., 2012 - jcomputers.us
This paper is concerned with an extensive form of stream cipher Trivium. Trivium is extended to a scalable form by the coupling connection of Trivium-like shift registers. The …