A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments

JH Kong, LM Ang, KP Seng - Journal of Network and Computer …, 2015 - Elsevier
Modern cryptographic algorithms play an irreplaceable role in data communication systems
for various areas of applications. These algorithms are the backbone of data protection and …

Using hardware features for increased debugging transparency

F Zhang, K Leach, A Stavrou, H Wang… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
With the rapid proliferation of malware attacks on the Internet, understanding these
malicious behaviors plays a critical role in crafting effective defense. Advanced malware …

Hardware stream cipher with controllable chaos generator for colour image encryption

ML Barakat, AS Mansingka, AG Radwan… - IET image …, 2014 - Wiley Online Library
This study presents hardware realisation of chaos‐based stream cipher utilised for image
encryption applications. A third‐order chaotic system with signum non‐linearity is …

4G Network Security Algorithms: Overview.

RM Zaki, HBA Wahab - International Journal of Interactive …, 2021 - search.ebscohost.com
Abstract Long Term Evolution (LTE) of (Universal Mobile Telecommunication System) is one
of the modern steps in series of mobile telecommunications systems. That appears to be a …

FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0

P Kitsos, N Sklavos, G Provelengios… - Microprocessors and …, 2013 - Elsevier
In this paper, the hardware implementations of six representative stream ciphers are
compared in terms of performance, consumed area and the throughput-to-area ratio. The …

Key-Dependent Feedback Configuration Matrix of Primitive σ–LFSR and Resistance to Some Known Plaintext Attacks

S Nandi, S Krishnaswamy, B Zolfaghari, P Mitra - Ieee Access, 2022 - ieeexplore.ieee.org
In this paper, we propose and evaluate a method for generating key-dependent feedback
configurations (KDFC) for-LFSRs.-LFSRs with such configurations can be applied to any …

Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA

L Zhang, L Xia, Z Liu, J Jing… - 2012 IEEE 11th …, 2012 - ieeexplore.ieee.org
SNOW 3G and ZUC are both the heart of secure algorithm sets in 3GPP LTE-Advanced,
which is the potential candidate for 4G mobile broadband communication standard. In this …

An FPGA implementation of the ZUC stream cipher

P Kitsos, N Sklavos, AN Skodras - 2011 14th Euromicro …, 2011 - ieeexplore.ieee.org
In this paper a hardware implementation of ZUC stream cipher is presented. ZUC is a stream
cipher that forms the heart of the 3GPP confidentiality algorithm 128-EEA3 and the 3GPP …

Designing integrated accelerator for stream ciphers with structural similarities

S Sen Gupta, A Chattopadhyay, A Khalid - Cryptography and …, 2013 - Springer
To date, the basic idea for implementing stream ciphers has been confined to individual
standalone designs. In this paper, we introduce the notion of integrated implementation of …

FPGA implementations of 256-Bit SNOW stream ciphers for postquantum mobile security

M Bahadori, K Järvinen, V Niemi - IEEE Transactions on Very …, 2021 - ieeexplore.ieee.org
Quantum computing is a serious threat for contemporary cryptography and, in order to
address this threat, key sizes used for symmetric cryptography should be doubled, most …