ALE: AES-Based Lightweight Authenticated Encryption
暂无分享,去创建一个
Vincent Rijmen | Andrey Bogdanov | Florian Mendel | Francesco Regazzoni | Elmar Tischhauser | A. Bogdanov | F. Regazzoni | V. Rijmen | Elmar Tischhauser | Florian Mendel
[1] Josef Pieprzyk,et al. Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings , 2008, ASIACRYPT.
[2] Jongsung Kim,et al. HIGHT: A New Block Cipher Suitable for Low-Resource Device , 2006, CHES.
[3] Tsuyoshi Takagi,et al. Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings , 2011, CHES.
[4] Shai Halevi. Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings , 2009, CRYPTO.
[5] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[6] Willi Meier,et al. Quark: A Lightweight Hash , 2010, Journal of Cryptology.
[7] Thomas Peyrin,et al. The PHOTON Family of Lightweight Hash Functions , 2011, IACR Cryptol. ePrint Arch..
[8] Seokhie Hong,et al. Provable Security against Differential and Linear Cryptanalysis for the SPN Structure , 2000, FSE.
[9] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[10] Matthew J. B. Robshaw,et al. New Stream Cipher Designs: The eSTREAM Finalists , 2008 .
[11] David Canright,et al. A Very Compact S-Box for AES , 2005, CHES.
[12] Jean-Jacques Quisquater,et al. SEA: A Scalable Encryption Algorithm for Small Embedded Applications , 2006, CARDIS.
[13] Berk Sunar,et al. Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings , 2005, CHES.
[14] Adi Shamir,et al. ALRED Blues: New Attacks on AES-Based MAC's , 2011, IACR Cryptol. ePrint Arch..
[15] Martin Hell,et al. The Grain Family of Stream Ciphers , 2008, The eSTREAM Finalists.
[16] Phillip Rogaway,et al. The Software Performance of Authenticated-Encryption Modes , 2011, FSE.
[17] Daniel W. Engels,et al. The Hummingbird-2 Lightweight Authenticated Encryption Algorithm , 2011, RFIDSec.
[18] Ors Yalcin,et al. Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers , 2010, RFIDSec.
[19] Orr Dunkelman,et al. An Improved Impossible Differential Attack on MISTY1 , 2008, ASIACRYPT.
[20] Martin Hell,et al. A Note on Distinguishing Attacks , 2007, 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks.
[21] Bart Preneel,et al. Cryptanalysis of the Stream Cipher DECIM , 2006, FSE.
[22] Kenneth G. Paterson. Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings , 2011, EUROCRYPT.
[23] Guido Bertoni,et al. On the Indifferentiability of the Sponge Construction , 2008, EUROCRYPT.
[24] Jean-Louis Lanet,et al. Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings , 2010, CARDIS.
[25] Wei Wang,et al. New Birthday Attacks on Some MACs Based on Block Ciphers , 2009, CRYPTO.
[26] Christof Paar,et al. Pushing the Limits: A Very Compact and a Threshold Implementation of AES , 2011, EUROCRYPT.
[27] Patrick Fay,et al. Breakthrough AES Performance with Intel ® AES New Instructions , 2010 .
[28] Goce Jakimoski,et al. ASC-1: An Authenticated Encryption Stream Cipher , 2011, Selected Areas in Cryptography.
[29] Martin Hell,et al. Grain-128a: a new version of Grain-128 with optional authentication , 2011, Int. J. Wirel. Mob. Comput..
[30] Stefan Mangard,et al. Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings , 2010, CHES.
[31] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[32] Alex Biryukov,et al. Design of a New Stream Cipher-LEX , 2008, The eSTREAM Finalists.
[33] Elif Bilge Kavun,et al. A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications , 2010, RFIDSec.
[34] Ingrid Verbauwhede,et al. Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings , 2007, CHES.
[35] Patrick Schaumont,et al. Cryptographic Hardware and Embedded Systems – CHES 2012 , 2012, Lecture Notes in Computer Science.
[36] Vincent Rijmen,et al. The Pelican MAC Function , 2005, IACR Cryptol. ePrint Arch..
[37] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[38] Nigel P. Smart,et al. Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings , 2008, EUROCRYPT.
[39] Andrey Bogdanov,et al. spongent: A Lightweight Hash Function , 2011, CHES.
[40] Steve Babbage,et al. The MICKEY Stream Ciphers , 2008, The eSTREAM Finalists.
[41] Christophe De Cannière,et al. KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers , 2009, CHES.
[42] Kazuhiko Minematsu,et al. Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations , 2006, FSE.
[43] Vincent Rijmen,et al. The Wide Trail Design Strategy , 2001, IMACC.
[44] Mihir Bellare,et al. OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.
[45] Christof Paar,et al. New Lightweight DES Variants , 2007, FSE.
[46] Christophe Clavier,et al. Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings , 2009, CHES.
[47] Elisabeth Oswald,et al. A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework , 2011, CRYPTO.
[48] Pierre-Alain Fouque,et al. Automatic Search of Attacks on round-reduced AES and Applications , 2011, IACR Cryptol. ePrint Arch..
[49] Mitsuru Matsui,et al. Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings , 2006, CHES.
[50] Vincent Rijmen,et al. Refinements of the ALRED construction and MAC security claims , 2010, IET Inf. Secur..
[51] Chae Hoon Lim,et al. mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors , 2005, WISA.
[52] Vincent Rijmen,et al. Probability distributions of correlation and differentials in block ciphers , 2007, J. Math. Cryptol..
[53] Shiho Moriai,et al. Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation , 2012, CHES.
[54] Colin Boyd,et al. Cryptography and Coding , 1995, Lecture Notes in Computer Science.