2018
DOI: 10.1007/s11277-018-5606-8
|View full text |Cite
|
Sign up to set email alerts
|

Compact and High Speed Architectures of KASUMI Block Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…The two algorithms resemble in terms of Linear / Differential cryptanalysis, architectural characteristics, and the key requirements; nevertheless, they have several contrasting features / design constraints for round operations. The attacks against MISTY1 and 3gpp standardized KASUMI have identified the weaknesses; however, no serious drawbacks / shortcomings have been found against the full 8-rounds MISTY1 and 3gpp standardized KASUMI output feedback (OFB) and Cipher Block Chaining (CBC) modes [11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The two algorithms resemble in terms of Linear / Differential cryptanalysis, architectural characteristics, and the key requirements; nevertheless, they have several contrasting features / design constraints for round operations. The attacks against MISTY1 and 3gpp standardized KASUMI have identified the weaknesses; however, no serious drawbacks / shortcomings have been found against the full 8-rounds MISTY1 and 3gpp standardized KASUMI output feedback (OFB) and Cipher Block Chaining (CBC) modes [11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the repetitive-loop structure results in a low throughput value of 130.2 Mbps and in-turn the high-power consumption [15][16][17][18][19][20][21][22][23][24][25][26]. Studies on static reconfigurable cryptographic modules have also been proposed for SNOW / ZUC algorithms and AES / KASUMI / SNOW / ZUC algorithms signifying flexible implementations [14,[27][28][29][30][31][32][33][34][35][36].…”
Section: Introductionmentioning
confidence: 99%
“…To meet the requirement of the Internet of ings, cryptographic algorithms are frequently optimized for area reduction and high throughput implementation or to achieve a good tradeoff between throughput and speed [12][13][14][15][16][17][18][19][20][21][22][23][24][25]. For low-area design, reutilization/logic optimization methodologies have been widely adopted thereby implementing s-boxes using combinational logic [12][13][14][15][16][17][18][19][20]. A single-round MISTY1 architecture designed for compact implementation is proposed in [20] consisting of only oddround functions, i.e., 2 × FL functions, 1 × FO function, and 1 × 32 bit XOR.…”
Section: Introductionmentioning
confidence: 99%