최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會誌 = KIISC review, v.32 no.1, 2022년, pp.39 - 45
이용성 (고려대학교 정보보호대학원) , 홍석희 (고려대학교 정보보호대학원)
Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B.-S, Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J., Chee, S. "HIGHT: A New Block Cipher Suitable for Low-Resource Device", CHES 2006. LNCS, vol. 4249, pp. 46-59, 2006.
Hong, D., Lee, J. K., Kim, D. C., Kwon, D., Ryu, K. H., & Lee, D. G., "LEA: A 128-bit block cipher for fast encryption on common processors", International Workshop on Information Security Applications, pp. 3-27, 2013.
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., & Wingers, L., "The SIMON and SPECK lightweight block ciphers", Proceedings of the 52nd Annual Design Automation Conference, pp. 1-6, 2015.
Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J., Bobshaw, M. J., Seurin. Y., Vikkelsoe, C., "PRESENT: An Ultra-Lightweight Block Cipher", CHES 2007, pp. 450-466, 2007.
Banik, S., Pandey, S. K., Peyrin, T., Sasaki, Y., Sim, S. M., Todo, Y., " GIFT: a small present", International Conference on Cryptographic Hardware and Embedded Systems, pp. 321-345, 2017.
Beierle, C., Jean, J., Kolbl, S., Leander, G., Moradi, A., Peyrin, T., Sasaki, Y., Sasdrich, P., Sim, S. M., "The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS", CRYPTO 2016, pp. 123-153, 2016.
Leander, G., Poschmann, A. "On the classification of 4 bit s-boxes", In International Workshop on the Arithmetic of Finite Fields, pp. 159-176, 2007.
NIST, "Submission Requirements and Evaluation Criteria for the Lightweight Cryptography Standar dization Process", "https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/final-lwc-submission-requirements-august2018.pdf", 2018.
NIST, "Status Report on the First Round of the NIST Lightweight Cryptography Standardization Process", NISTIR 8268, 2019.
NIST, "Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process", NISTIR 8369, 2021.
Banik, S., Chakraborti, A., Iwata, T., Minematsu, K., Nandi, M., Peyrin, T., Sasaki, Y., Sim, S., M., Todo, Y., "GIFT-COFB", "https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/gift-cofb-spec-final.pdf", 2021.
Wen, F., Liu, J., Shan, W. "The COFB Mode of Operation and Its Security Analysis", 2006 International Conference on Computational Intelligence and Security, Vol. 2, pp. 1335-1338, IEEE, 2006.
Li, L., Wu, W., Zheng, Y., Zhang, L. "The Relationship between the Construction and Solution of the MILP Models and Applications" IACR Cryptol. ePrint Arch., 2019/49, 2019.
Banik, S., Bogdanov, A., Peyrin, T., Sasaki, Y., Sim, S., M., Tischhauser, E., Todo, Y., "SUNDAE-GIFT", "https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/SUNDAE-GIFT-spec.pdf", 2021.
Iwata, T., Khairallah, M., Minematsum, K., Peyrin, T., Guo, C., "Romulus", "https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/romulus-spec-final.pdf", 2021.
Jean, J., Nikolic, I., Peyrin, T. "Tweaks and keys for block ciphers: The TWEAKEY framework". In International Conference on the Theory and Application of Cryptology and Information Security, pp. 274-288, Springer, 2014.
Hongjun Wu, Tao Huang, "TinyJAMBU", "https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/tinyjambu-spec-final.pdf", 2021.
Saha, D., Sasaki, Y., Shi, D., Sibleyras, F., Sun, S., Zhang, Y. "On the security margin of TinyJAMBU with refined differential and linear cryptanalysis". IACR Transactions on Symmetric Cryptology, pp. 152-174, 2020.
NIST, "SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions", FIPS 202, 2015.
Dobraunigm, C., Eichlseder, M., Mendel, F., Schlaffer M., "ASCON", "https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/ascon-spec-final.pdf", 2021.
Dobraunig, C., Eichlseder, M., Mangard, S., Mendel, F., Mennink, B., Primas, R., Unterluggauer, T., "ISAP", "https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/isap-spec-final.pdf", 2021.
Bao, Z., Chakraborti, A., Datta, N., Guo, J., Nand i, M., Peyrin, T., Yasuda, K., "PHOTON-Beetle", "https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/photon-beetle-spec-final.pdf", 2021.
Guo, J., Peyrin, T., Poschmann, A. "The PHOTON family of lightweight hash functions" In Annual Cryptology Conference, pp. 222-239. Springer, 2011.
Chakraborti, A., Datta, N., Nandi, M., Yasuda, K. "Beetle family of lightweight and secure authenticated encryption ciphers". IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 218-241, 2018.
Beierle, C., Biryukov, A., Santos, L., C., Grossschadl, J., Perrin, L., Udovenko, A., Velichkov, V., Wang, Q., Moradi, A., Shahmirzadi, A., R., "SPA RKLE", "https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/sparkle-spec-final.pdf", 2021.
Dinu, D., Perrin, L., Udovenko, A., Velichkov, V., Grossschadl, J., Biryukov, A. "Sparx: a family of ARX-based lightweight block ciphers provably secure against linear and differential attacks", In NIST Lightweight Cryptography Workshop 2016. 2016.
Daemen, J., Hoffert, S., Peeters, M., Assche, G., V., Keer, R., V., Mella, S., "Xoodyak", "https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/xoodyak-spec-final.pdf", 2021.
Daemen, J., Hoffert, S., Van Assche, G., Van Keer, R., "The design of Xoodoo and Xoofff", IACR Trans. Symmetric Cryptol. no. 4, pp. 1-38, 2018.
Hell, M., Johansson, T., Meier, W., Sonnerup, J., Yoshida, H., Maximov, A., "Grain-128AEAD", https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/documents/finalist-round/updated-spec-doc/grain-128aead-spec-final.pdf", 2021.
Hell, M., Johansson, T.,Meier, W. "Grain: a stream cipher for constrained environments", International journal of wireless and mobile computing, 2(1), pp. 86-93. 2007.
Wu, H., Huang, T., "JAMBU lightweight authenticated encryption mode and AES-JAMBU". CAESAR competition proposal. 2014.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.