Qinghai, "The scheme for improving the efficiency of
block cipher algorithm," in Proceedings of the 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA), pp.
Related Works on Simeck Family
Block Cipher. Related works which focus on the Simeck family
block cipher can be divided into three types: cryptanalysis, side-channel attacks, and efficient implementations.
Leander et al., "PRESENT: an ultra-lightweight
block cipher," in Proceeding ofCHES 2007, vol.
Rather the network produces unique link-id's based on pseudonyms using pairing on
block cipher key authentication [21].
Gong, "A unified method for finding impossible differentials of
block cipher structures," Information Science, Vol.
Lu, Research on Optimization and Improvement of S-box in
Block Cipher, Southwest Jiaotong University, Sichuan, China, 2013.
Wagner, Twofish: A 128-bit
block cipher, NIST AES Proposal 15 (1998).
Recommendation for
block cipher modes of operation.
Thus stream cipher is well suited for burst switching compared to the
block cipher.
recently announced that CLEFIA, the
block cipher algorithm it developed and presented as a state-of-the-art cryptography technique in 2007, has been adopted as one of the ISO/IEC 29192 International Standards in lightweight cryptography after the final approval of ISO (International Organization for Standardization)/IEC (International Electrotechnical Commission).
Generally, stream cipher is used in environment where encryption need to be done in a continuous stream of bits (rather than by block as in
block cipher).
As an example, the IEEE802.15.4 radio, which is vastly popular for wireless sensor and actuator networks, uses the 128-bit Advanced Encryption Standard (AES)
block cipher. The cipher is operated with a symmetric (shared private) key to encrypt frames at the link layer for data secrecy, and combined with nonces (number used once) to provide source authentication between conversing nodes.