Qinghai, "The scheme for improving the efficiency of block cipher
algorithm," in Proceedings of the 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA), pp.
Related Works on Simeck Family Block Cipher
. Related works which focus on the Simeck family block cipher
can be divided into three types: cryptanalysis, side-channel attacks, and efficient implementations.
Leander et al., "PRESENT: an ultra-lightweight block cipher
," in Proceeding ofCHES 2007, vol.
Rather the network produces unique link-id's based on pseudonyms using pairing on block cipher
key authentication .
Gong, "A unified method for finding impossible differentials of block cipher
structures," Information Science, Vol.
Lu, Research on Optimization and Improvement of S-box in Block Cipher
, Southwest Jiaotong University, Sichuan, China, 2013.
Wagner, Twofish: A 128-bit block cipher
, NIST AES Proposal 15 (1998).
Recommendation for block cipher
modes of operation.
Thus stream cipher is well suited for burst switching compared to the block cipher
recently announced that CLEFIA, the block cipher
algorithm it developed and presented as a state-of-the-art cryptography technique in 2007, has been adopted as one of the ISO/IEC 29192 International Standards in lightweight cryptography after the final approval of ISO (International Organization for Standardization)/IEC (International Electrotechnical Commission).
Generally, stream cipher is used in environment where encryption need to be done in a continuous stream of bits (rather than by block as in block cipher
As an example, the IEEE802.15.4 radio, which is vastly popular for wireless sensor and actuator networks, uses the 128-bit Advanced Encryption Standard (AES) block cipher
. The cipher is operated with a symmetric (shared private) key to encrypt frames at the link layer for data secrecy, and combined with nonces (number used once) to provide source authentication between conversing nodes.