CLC number: TP309.7
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2017-02-28
Cited: 0
Clicked: 7945
Gaurav Bansod, Narayan Pisharoty, Abhijit Patil. BORON: an ultra-lightweight and low power encryption design for pervasive computing[J]. Frontiers of Information Technology & Electronic Engineering,in press.https://doi.org/10.1631/FITEE.1500415 @article{title="BORON: an ultra-lightweight and low power encryption design for pervasive computing", %0 Journal Article TY - JOUR
BORON:面向普适计算的超轻量低功耗加密设计关键词组: Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article
Reference[1]Albrecht, M., Cid, C., 2009. Algebraic techniques in differential cryptanalysis. LNCS, 5665:193-208. ![]() [2]Anderson, R., Biham, E., Knudsen, L., 1998. Serpent: a proposal for the advanced encryption standard. 1st Advanced Encryption Standard (AES) Conf., p.1-23. ![]() [3]Bansod, G., Raval, N., Pisharoty, N., 2015. Implementation of a new lightweight encryption design for embedded security. IEEE Trans. Inform. Forens. Secur., 10(1):142-151. ![]() [4]Bansod, G. Pisharoty, N., Patil, A., 2016. PICO: an ultra lightweight and low power encryption design for pervasive computing. Def. Sci. J., 66(3):259-265. ![]() [5]Beaulieu, R., Shors, D., Smith, J., et al., 2013. The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013/404. ![]() [6]Biham, E., 1993. New types of cryptanalytic attacks using related keys. EUROCRYPT, p.398-409. ![]() [7]Biham, E., Shamir, A., 1991. Differential cryptanalysis of DES-like cryptosystems. J. Cryptol., 4(1):3-72. ![]() [8]Biryukov, A., Wagner, D., 2000. Advanced slide attacks. EUROCRYPT, p.589-606. ![]() [9]Biryukov, A., Khovratovich, D., Nikolić, I., 2009. Distinguisher and related-key attack on the full AES-256. Cryptology ePrint Archive, Report 2009/241. ![]() [10]Bogdanov, A., Rijmen, V., 2011. Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Cryptology ePrint Archive, Report 2011/123. ![]() [11]Bogdanov, A., Knudsen, L.R., Leander, G., et al., 2007. PRESENT: an ultra-lightweight block cipher. LNCS, 4727:450-466. ![]() [12]Bogdanov, A., Khovratovich, D., Rechberger, C., 2011. Biclique cryptanalysis of the full AES. LNCS, 7073: 344-371. ![]() [13]Guo, J., Peyrin, T., Poschmann, A., et al., 2011. The LED block cipher. LNCS, 6917:326-341. ![]() [14]Heys, H.M., 2001. A tutorial on linear and differential cryptanalysis. Cryptologia, 26(3):189-221. ![]() [15]Jeong, K., Kang, H., Lee, C., et al., 2012. Biclique cryptanalysis of lightweight block ciphers PRESENT, Piccolo and LED. Cryptology ePrint Archive, Report 2012/621. ![]() [16]Kelsey, J., Schneier, B., Wagner, D., 1997. Related-key cryptanalysis of 3-WAY, Biham DES, CAST, DES-X, new DES, RC2, and TEA. LNCS, 1334:233-246. ![]() [17]Kumar, M., Pal, S.K., Panigrahi, A., 2014. FeW: a lightweight block cipher. Cryptology ePrint Archive, Report 2014/326. ![]() [18]Leander, G., Poschmann, A., 2007. On the classification of 4 bit S-boxes. LNCS, 4547:159-176. ![]() [19]Matsui, M., 1993. Linear cryptanalysis method for DES cipher. LNCS, 765:386-397. ![]() [20]Matsui, M., 1994. On correlation between the order of S-boxes and the strength of DES. LNCS, 950:366-375. ![]() [21]Menezes, A.J., van Oorschot, P.C., Vanstone, S.A., 1996. Handbook of Applied Cryptography. CRC Press. ![]() [22]National Institute of Standards and Technology (NIST), 2001. Advanced Encryption Standard (AES). FIPS 197. http://csrc.nist.gov/publications/PubsFIPS.html ![]() [23]Poschmann, A., 2009. Lightweight Cryptography: Cryptographic Engineering for a Pervasive World. PhD Thesis, Ruhr-University Bochum, Germany. ![]() [24]Shi, Z., Lee, R.B., 2000. Bit permutation instructions for accelerating software cryptography. Proc. IEEE Int. Conf. on Application-Specific Systems, Architectures, and Processors, p.138-148. ![]() [25]Shibutani, K., Isobe, T., Hiwatari, H., et al., 2011. Piccolo: an ultra-lightweight blockcipher. LNCS, 6917:342-357. ![]() [26]Soleimany, H., Nyberg, K., 2012. Zero-correlation linear cryptanalysis of reduced-round LBlock. Cryptology ePrint Archive, Report 2012/570. ![]() [27]Sun, S., Hu, L., Wang, M., et al., 2014a. Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with predefined properties. Cryptology ePrint Archive, 2014/747. ![]() [28]Sun, S., Hu, L., Wang, P., et al., 2014b. Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers. LNCS, 8873:158-178. ![]() [29]Suzaki, T., Minematsu, K., Morioka, S., et al., 2011. TWINE: a lightweight, versatile block cipher. ECRYPT Workshop on Lightweight Cryptography, p.146-169. ![]() [30]Wu, W., Zhang, L., 2011. LBlock: a lightweight block cipher. LNCS, 6715:327-344. ![]() [31]Zhang, W., Bao, Z., Lin, D., et al., 2014. RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. Cryptology ePrint Archive, Report 2014/084. ![]() Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou
310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE |
Open peer comments: Debate/Discuss/Question/Opinion
<1>