A totally involutional, highly scalable PP-1 cipher is proposed, evaluated and discussed. Having very low memory requirements and using only simple and fast arithmetic operations, the cipher is aimed at platforms with limited resources, e.g., smartcards. At the core of the cipher's processing is a carefully designed S-box. The paper discusses in detail all aspects of PP-1 cipher design including S-box construction, permutation and round key scheduling. The quality of the PP-1 cipher is also evaluated with respect to linear cryptanalysis and other attacks. PP-1's concurrent error detection is also discussed. Some processing speed test results are given and compared with those of other ciphers
This paper describes BEAST, a new blockcipher for arbitrary size blocks. It is a Luby-Rackoff cipher...
Recently, a new public-key cryptosystem constructed on number fields is presented. The prominent the...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message ...
PP-1 is a scalable block cipher which can be implemented on a platform with limited resource. In thi...
In the present paper, a new cryptographic lightweight algorithm has been developed for the Internet ...
Abstract: Pervasive computing utilizes devices with cost constraints and limited resources in terms...
Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which on...
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
In this paper we present a differential attack on the block cipher PP-1 which was designed at Poznan...
Abstract--Cryptographic algorithms are important components in secure systems. We propose PAX, a tin...
The paper presents a block cipher which offers a good encryption rate on any platform. It is particu...
International audienceThis paper proposes a new quasi-involutive lightweight design called CUBE ciph...
Abstract. This paper presents a new block cipher which offers good encryption rate on any platform. ...
Most of today’s cryptographic primitives are based on computations that are hard to perform for a po...
Block cipher encryption works on fixed length blocks, usually 128bits. The blocks of data are transf...
This paper describes BEAST, a new blockcipher for arbitrary size blocks. It is a Luby-Rackoff cipher...
Recently, a new public-key cryptosystem constructed on number fields is presented. The prominent the...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message ...
PP-1 is a scalable block cipher which can be implemented on a platform with limited resource. In thi...
In the present paper, a new cryptographic lightweight algorithm has been developed for the Internet ...
Abstract: Pervasive computing utilizes devices with cost constraints and limited resources in terms...
Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which on...
Abstract. Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext block...
In this paper we present a differential attack on the block cipher PP-1 which was designed at Poznan...
Abstract--Cryptographic algorithms are important components in secure systems. We propose PAX, a tin...
The paper presents a block cipher which offers a good encryption rate on any platform. It is particu...
International audienceThis paper proposes a new quasi-involutive lightweight design called CUBE ciph...
Abstract. This paper presents a new block cipher which offers good encryption rate on any platform. ...
Most of today’s cryptographic primitives are based on computations that are hard to perform for a po...
Block cipher encryption works on fixed length blocks, usually 128bits. The blocks of data are transf...
This paper describes BEAST, a new blockcipher for arbitrary size blocks. It is a Luby-Rackoff cipher...
Recently, a new public-key cryptosystem constructed on number fields is presented. The prominent the...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message ...