Most present symmetric encryption algorithms result from a tradeoff between implementation cost and resulting performances. In addition, they generally aim to be implemented efficiently on a large variety of platforms. In this paper, we take an opposite approach and consider a context where we have very limited processing resources and throughput requirements. For this purpose, we propose low-cost encryption routines (i.e. with small code size and memory) targeted for processors with a limited instruction set (i.e. AND, OR, XOR gates, word rotation and modular addition). The proposed design is parametric in the text, key and processor size, allows efficient combination of encryption/decryption, "on-the-fly" key derivation and its security a...
[[abstract]]© 1999 City Univ. Hong Kong-A new 128-bit block cipher called SEA is proposed. SEA uses ...
Modern applications, especially real time applications, are hungry for high-speed end-to-end transmi...
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...
Abstract. Most present symmetric encryption algorithms result from a tradeoff between implementation...
SEA – Scalable Encryption Algorithm is a block cipher based symmetric encryption scheme, particularl...
Cryptography technology is a security technique used to change plain text to another shape of data o...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, t...
Abstract. SEA is a scalable encryption algorithm targeted for small embedded applications. It was in...
International audienceThe problem of securing data present on USB memories and SD cards has not been...
Abstract—SEA is a scalable encryption algorithm targeted for small embedded applications. It was ini...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
Abstract. For constrained devices, standard cryptographic algorithms can be too big, too slow or too...
[[abstract]]© 1999 City Univ. Hong Kong-A new 128-bit block cipher called SEA is proposed. SEA uses ...
Modern applications, especially real time applications, are hungry for high-speed end-to-end transmi...
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...
Abstract. Most present symmetric encryption algorithms result from a tradeoff between implementation...
SEA – Scalable Encryption Algorithm is a block cipher based symmetric encryption scheme, particularl...
Cryptography technology is a security technique used to change plain text to another shape of data o...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, t...
Abstract. SEA is a scalable encryption algorithm targeted for small embedded applications. It was in...
International audienceThe problem of securing data present on USB memories and SD cards has not been...
Abstract—SEA is a scalable encryption algorithm targeted for small embedded applications. It was ini...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
Abstract. For constrained devices, standard cryptographic algorithms can be too big, too slow or too...
[[abstract]]© 1999 City Univ. Hong Kong-A new 128-bit block cipher called SEA is proposed. SEA uses ...
Modern applications, especially real time applications, are hungry for high-speed end-to-end transmi...
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...