2018
DOI: 10.1007/978-3-030-00253-4_6
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Stream Ciphers for Green IT Engineering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 28 publications
(8 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…In [22,27], combinatorial properties of non-linear knots in the context of the security evaluation of various encryption modes and key schedules were investigated. In [22,[30][31][32][33][34][35][36], the influence of Sblocks on avalanche effects, differential and linear properties of block ciphers is investigated. The papers [35,37] are dedicated to the study of the properties of nonlinear replacement nodes in modern stream ciphers in comparison with the "Strumok" algorithm proposed as a new standard of stream encryption in Ukraine [37].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [22,27], combinatorial properties of non-linear knots in the context of the security evaluation of various encryption modes and key schedules were investigated. In [22,[30][31][32][33][34][35][36], the influence of Sblocks on avalanche effects, differential and linear properties of block ciphers is investigated. The papers [35,37] are dedicated to the study of the properties of nonlinear replacement nodes in modern stream ciphers in comparison with the "Strumok" algorithm proposed as a new standard of stream encryption in Ukraine [37].…”
Section: Discussionmentioning
confidence: 99%
“…The presented and not presented results allow us to characterize the state of modern technologies of designing the BSS (focusing on the most progressive of them by the following basic provisions [1,[26][27][28][29][30][31][32][33][34][35].…”
Section: Related Workmentioning
confidence: 99%
“…they are marked with « m »). In addition, many M-NLFSR functions that are not m-saturated by definition, achieve the highest possible result for the ) the tables 6-9 they are marked with « 1) »).Some of the obtained nonlinear recurrent relations of functions that are simultaneously m-optimal and m-saturated and that correspond with M-NLFSR[20][21][22][23][24][25][26][27][28][29].For 2 nd order M-70 functions with 10 monomials, 346 with 12 monomials, 1124 -14 monomials, 924 -16 monomials, 252 -18 monomials, 20 -20 monomials: By analyzing the results it can be seen that symmetric M-NLFSR have the same ) ( f sut and f N . All studied M-NLFSR with ( )…”
mentioning
confidence: 89%
“…The stream encryption of a long sequence has the most significant potential advantage over block cryptographic transformations [3,6,[19][20][21][22][23][24], which is essential for many applications [25][26][27][28][29][30][31][32][33][34][35][36][37].…”
Section: Performance Evaluationmentioning
confidence: 99%