2014
DOI: 10.1007/978-3-319-11599-3_7
|View full text |Cite
|
Sign up to set email alerts
|

π-Cipher: Authenticated Encryption for Big Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 19 publications
(28 citation statements)
references
References 9 publications
0
28
0
Order By: Relevance
“…The rotator is responsible for left rotating the adder's outputs by different rotation values based on the algorithmic description of the π-Cipher [15].…”
Section: B Rotatormentioning
confidence: 99%
See 4 more Smart Citations
“…The rotator is responsible for left rotating the adder's outputs by different rotation values based on the algorithmic description of the π-Cipher [15].…”
Section: B Rotatormentioning
confidence: 99%
“…The XOR banks, as shown in Figure 2a and Figure 2b, are intermediate stages between the rotators outputs and the final stage of the engine, to maximize the diffusion of the bits [15]. The output data of both XOR banks are added to each other by using four 16-bit parallel ripple-carry adders, as shown in Figure 2c.…”
Section: Xor Bankmentioning
confidence: 99%
See 3 more Smart Citations