• PRESENT

  • Referenced in 166 articles [sw08313]
  • designed and is 2.5 times smaller than AES (Advanced Encryption Standard).[1] The block size...
  • Camellia

  • Referenced in 84 articles [sw09731]
  • interface specifications as the Advanced Encryption Standard (AES). Efficiency on both software and hardware platforms ... differential and linear cryptanalyses. Compared to the AES finalists, i.e., MARS, RC6, Rijndael, Serpent...
  • Serpent

  • Referenced in 49 articles [sw21989]
  • Standard. It was a finalist in the AES competition. The winner, Rijndael, got 86 votes ... last AES conference while Serpent got 59 votes, Twofish 31 votes, RC6 23 votes ... NIST’s choice of Rijndael as the AES was not surprising...
  • Poly1305-AES

  • Referenced in 20 articles [sw26748]
  • Poly1305-AES message-authentication code. Poly1305-AES is a state-of-the-art message-authentication ... wide variety of applications. Poly1305-AES computes a 16-byte authenticator of a variable-length ... message, using a 16-byte AES key, a 16-byte additional ... byte nonce. The security of Poly1305-AES is very close to the security...
  • LEX

  • Referenced in 19 articles [sw19585]
  • based on this methodology and on the AES block cipher, was selected to round ... secret key in time of about 2100 AES encryptions. Following a preliminary version...
  • tweakey

  • Referenced in 24 articles [sw12816]
  • public round permutation (for instance, the aes round). Increasing the sizes renders the security analysis...
  • SAFER

  • Referenced in 21 articles [sw21990]
  • SAFER++ — were submitted as candidates to the AES process and the NESSIE project respectively...
  • TASTY

  • Referenced in 18 articles [sw09865]
  • online latency for securely evaluating the AES functionality by an order of magnitude compared...
  • CRYPTON

  • Referenced in 12 articles [sw23983]
  • candidate algorithm for the Advanced Encryption Standard (AES). To fix some minor weakness ... boxes, we made some changes to the AES proposal, i.e., in the S-box construction...
  • EPCBC

  • Referenced in 6 articles [sw11640]
  • recent class of powerful attacks on AES. Related-key attacks are especially relevant when ... encryption, since for other ciphers such as AES and PRESENT, it is necessary to encrypt...
  • AEGIS

  • Referenced in 4 articles [sw13246]
  • protecting network packets. AEGIS-128 uses five AES round functions to process a 16-byte ... message block (one step); AES-256 uses six AES round functions. The security analysis shows...
  • LEA

  • Referenced in 6 articles [sw24781]
  • experiments show that LEA is faster than AES on Intel, AMD, ARM, and ColdFire platforms...
  • AESNI

  • Referenced in 2 articles [sw09710]
  • Intel® AES New Instructions (AES-NI) Sample Library demonstrates how one might implement a high ... performance Advanced Encryption Standard (AES) block cipher using the new AES-NI instructions available ... divided into three parts; The Intel® AES sample library, an AES example implementation using ... application that compares Dr. Brian Gladman’s AES performance with that...
  • Janus

  • Referenced in 3 articles [sw18580]
  • verify existing results on ARIA and the AES. Additionally, by using this framework, we could ... biclique attacks on all versions of the AES-like cipher BKSQ...
  • TRESOR

  • Referenced in 2 articles [sw37375]
  • Linux kernel patch that implements the AES encryption algorithm and its key management solely ... solution takes advantage of Intel’s new AES-NI instruction set and exploits ... with that of standard AES implementations...
  • CBEAM

  • Referenced in 3 articles [sw15633]
  • implementation offers not only comparable speeds to AES but also increased security against cache side...
  • POEx

  • Referenced in 3 articles [sw22877]
  • bound, and so are those of the AE schemes built upon them. This work proposes...
  • PQM4

  • Referenced in 3 articles [sw34496]
  • symmetric primitives (SHA-2, SHA-3, AES); integration of clean implementations from PQClean; and easy...