Abstract. Rabbit is a software-oriented synchronous stream cipher with very strong security properties and support for 128-bit keys. Rabbit is part of the European Union’s eSTREAM portfolio of stream ciphers addressing the need for strong and computationally efficient (i.e., fast) ciphers. Extensive cryptanalysis confirms Rabbit’s strength against mod-ern attacks; attacks with complexity lower than an exhaustive key search have not been found. Previous software implementations have demon-strated Rabbit’s high throughput, however, the performance in hardware has only been estimated. Three reconfigurable hardware designs of the Rabbit stream cipher – direct, interleaved and generalized folded struc-ture (GFS) – are presented. On the Xilinx V...
In this paper we discuss hardware implementations of the two best ciphers in the AES contest – the w...
Reconfigurable computing is gaining rising attention as an alternative to traditional processing for...
Abstract. The ESTREAM project has identified two profiles for stream ciphers: a hardware profile and...
Abstract. The stream cipher Rabbit was first presented at FSE 2003 [3], and no attacks against it ha...
Stream ciphers have the reputation to be very efficient when implemented in hardware, much more effi...
Stream ciphers have the reputation to be very efficient when implemented in hardware, much more effi...
Abstract. The stream cipher Rabbit was first presented at FSE 2003 [6]. In the paper at hand, a full...
Abstract—Fast stream ciphers are used extensively for en-crypted data transmission in mobile network...
Abstract. Efficient cryptographic implementations are a fundamental factor in the achievement and di...
Cryptography is the only practical method for protecting information transmitted through communicati...
With increasing usage of hardware accelerators in modern heterogeneous System-on-Chips (SoCs), the d...
ABSTRACT The new design methodology for secret-key block ciphers, based on introducing an optimum nu...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
In this paper the FPGA implementations for four stream ciphers are presented. The two stream ciphers...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
In this paper we discuss hardware implementations of the two best ciphers in the AES contest – the w...
Reconfigurable computing is gaining rising attention as an alternative to traditional processing for...
Abstract. The ESTREAM project has identified two profiles for stream ciphers: a hardware profile and...
Abstract. The stream cipher Rabbit was first presented at FSE 2003 [3], and no attacks against it ha...
Stream ciphers have the reputation to be very efficient when implemented in hardware, much more effi...
Stream ciphers have the reputation to be very efficient when implemented in hardware, much more effi...
Abstract. The stream cipher Rabbit was first presented at FSE 2003 [6]. In the paper at hand, a full...
Abstract—Fast stream ciphers are used extensively for en-crypted data transmission in mobile network...
Abstract. Efficient cryptographic implementations are a fundamental factor in the achievement and di...
Cryptography is the only practical method for protecting information transmitted through communicati...
With increasing usage of hardware accelerators in modern heterogeneous System-on-Chips (SoCs), the d...
ABSTRACT The new design methodology for secret-key block ciphers, based on introducing an optimum nu...
NESSIE is a 3-year research project (2000-2002). The goal of the project is to put forward some algo...
In this paper the FPGA implementations for four stream ciphers are presented. The two stream ciphers...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
In this paper we discuss hardware implementations of the two best ciphers in the AES contest – the w...
Reconfigurable computing is gaining rising attention as an alternative to traditional processing for...
Abstract. The ESTREAM project has identified two profiles for stream ciphers: a hardware profile and...