Chaos-based cryptography: a brief overview

L Kocarev - IEEE Circuits and Systems Magazine, 2001 - ieeexplore.ieee.org
Over the past decade, there has been tremendous interest in studying the behavior of
chaotic systems. They are characterized by sensitive dependence on initial conditions …

[PDF][PDF] Twofish: A 128-bit block cipher

B Schneier, J Kelsey, D Whiting, D Wagner… - NIST AES …, 1998 - karlin.mff.cuni.cz
Twofish is a 128-bit block cipher that accepts a variable-length key up to 256 bits. The cipher
is a 16-round Feistel network with a bijective F function made up of four key-dependent 8-by …

PipeRench: A reconfigurable architecture and compiler

SC Goldstein, H Schmit, M Budiu, S Cadambi… - Computer, 2000 - ieeexplore.ieee.org
With the proliferation of highly specialized embedded computer systems has come a
diversification of workloads for computing devices. General-purpose processors are …

An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists

AJ Elbirt, W Yip, B Chetwynd… - IEEE Transactions on Very …, 2001 - ieeexplore.ieee.org
The technical analysis used in determining which of the potential Advanced Encryption
Standard candidates was selected as the Advanced Encryption Algorithm includes efficiency …

Logistic map as a block encryption algorithm

L Kocarev, G Jakimoski - Physics Letters A, 2001 - Elsevier
We discuss the relationship between cryptography and chaos theory, and similarities of their
crucial concepts such as mixing property and sensitivity to changes in initial conditions and …

Cryptographic primitives for information authentication—State of the art

B Preneel - State of the Art in Applied Cryptography: Course on …, 1999 - Springer
This paper describes the state of the art for cryptographic primitives that are used for
protecting the authenticity of information: cryptographic hash functions and digital signature …

[PDF][PDF] An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists

AJ Elbirt, W Yip, B Chetwynd, C Paar - Proc. Third Advanced Encryption …, 2000 - Citeseer
The technical analysis used in determining which of the potential Advanced Encryption
Standard candidates was selected as the Advanced Encryption Algorithm includes efficiency …

Hash function based on chaotic tent maps

X Yi - IEEE Transactions on Circuits and Systems II: Express …, 2005 - ieeexplore.ieee.org
In cryptographic applications, hash functions are used within digital signature schemes to
provide data integrity (eg, to detect modification of an original message). In this brief, we …

Chaotic block ciphers: from theory to practical algorithms

N Masuda, G Jakimoski, K Aihara… - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Digital chaotic ciphers have been investigated for more than a decade. However, their
overall performance in terms of the tradeoff between security and speed, as well as the …

A novel image encryption algorithm based on hash function

SM Seyedzade, S Mirzakuchaki… - 2010 6th Iranian …, 2010 - ieeexplore.ieee.org
In this paper, a novel algorithm for image encryption based on SHA-512 is proposed. The
main idea of the algorithm is to use one half of image data for encryption of the other half of …