2001
DOI: 10.1007/3-540-45116-1_27
|View full text |Cite
|
Sign up to set email alerts
|

Fast Encryption Algorithm Spectr-H64

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2002
2002
2016
2016

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…It follows that the required memory of this attack is about 2 37:58 ð¼ 2 33:58 Á 2 Á 8Þ bytes. Step (3). The probability that a wrong subkey pair passes…”
Section: Attack On a Full-round Sco-1mentioning
confidence: 99%
See 1 more Smart Citation
“…It follows that the required memory of this attack is about 2 37:58 ð¼ 2 33:58 Á 2 Á 8Þ bytes. Step (3). The probability that a wrong subkey pair passes…”
Section: Attack On a Full-round Sco-1mentioning
confidence: 99%
“…Recently, several data dependent permutation (DDP)-based ciphers have been proposed for hardware implementations with low cost, such as SPECTR-H64 [3], the CIKS family (CIKS-1 [13] and CIKS-128 [1]) and the Cobra family (Cobra-S128 [2], Cobra-F64a [2] and Cobra-F64b [2], Cobra-H64 [16] and Cobra-H128 [16]). Since all of them use very simple key schedules in order to avoid time-consuming key preprocessing, they are suitable for use in networks which require high-speed encryption and frequent key changes.…”
Section: Introductionmentioning
confidence: 99%
“…Security and privacy are primary requirements and important issues for information exchange and storage that have attracted many interests in the field of ubiquitous computing systems, sensor networks, wireless networks, IPsec and mobile communication. As a result, more efficient cryptographic primitives such as DDPs [1,2] , DDOs [3] and SDDOs [4] are designed to provide high performance on resource constrained devices.…”
Section: Introductionmentioning
confidence: 99%
“…To attain these goals, data-dependent permutations (DDPs) have been used as a main design primitive in various block ciphers such as CIKS-1 (Moldovyan and Moldovyan, 2002), CIKS-128 , SPECTR-H64 (Goots et al, 2001), Cobra-S128 , Cobra-H64 (Sklavos et al, 2005) and Cobra-H128 (Sklavos et al, 2005). These DDPs are also a very efficient primitive for designing fast software encryption systems if the controlled bit permutation instruction proposed in Lee et al (2001) and Shi and Lee (2000) is embedded in a set of standard microprocessor command Lee et al, 2004).…”
Section: Introductionmentioning
confidence: 99%