Enhancing lightweight block cipher algorithm OLBCA through decreasing cost factor
Lightweight block cipher algorithms are vital for constrained environment. There are three factors should be considered when you design lightweight block cipher algorithm which are security, performance and cost. In this paper, we have improved the cost factor of OLBCA algorithm by decreasing the nu...
| Main Authors: | Al-Dabbagh, Sufyan Salim Mahmood, Alshaikhli, Imad Fakhri Taha, Al-Enezi, Khalid Abdulkareem, Alyaqoup, Mohammed Jasem |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/72315/ http://irep.iium.edu.my/72315/1/72315_Enhancing%20Lightweight%20Block%20Cipher.pdf http://irep.iium.edu.my/72315/2/72315_Enhancing%20Lightweight%20Block%20Cipher_SCOPUS.pdf |
Similar Items
Enhancing lightweight block cipher algorithm OLBCA
through decreasing cost factor
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015)
OLBCA: a new lightweight block cipher algorithm
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014)
Improving the cost factor of DLBCA lightweight block cipher algorithm
by: Al-Dabbagh, Sufyan Salim Mahmood, et al.
Published: (2018)
by: Al-Dabbagh, Sufyan Salim Mahmood, et al.
Published: (2018)
Enhancement of lightweight block cipher algorithms
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
HISEC: a new lightweight block cipher algorithm
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Lightweight block cipher algorithms: review paper
by: Salim, Sufyan, et al.
Published: (2016)
by: Salim, Sufyan, et al.
Published: (2016)
Key-dependent s-box in lightweight block ciphers
by: AlDabbagh, S.S.M., et al.
Published: (2014)
by: AlDabbagh, S.S.M., et al.
Published: (2014)
Block and stream cipher
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Lightweight block ciphers: A comparative study
by: Salim, Sufya, et al.
Published: (2012)
by: Salim, Sufya, et al.
Published: (2012)
Improving PRESENT lightweight algorithms
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Trivium and Rabbit stream cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
A new block cipher based on finite automata systems
by: Khaleel, Ghassan, et al.
Published: (2016)
by: Khaleel, Ghassan, et al.
Published: (2016)
The influence of internet and social media on purchasing
decisions in Kuwait
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
Comparative study of some symmetric ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
Polyalphabetic substitution cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Monoalphabetic substitution cipher
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Introduction
by: Israfil, Muhammad, et al.
Published: (2011)
by: Israfil, Muhammad, et al.
Published: (2011)
Shamir’s threshold scheme
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Blakely’s secret sharing scheme
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Analysis the components of SNOW 3G and ZUC ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2018)
by: Jassim, Khalid Fadhil, et al.
Published: (2018)
A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
by: Lee, Ting Rong
Published: (2021)
by: Lee, Ting Rong
Published: (2021)
Analysis randomness properties of basic components of SNOW 3G cipher in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
An improved full search block matching algorithm for imaging applications
by: AlDabbagh, S.S.M., et al.
Published: (2012)
by: AlDabbagh, S.S.M., et al.
Published: (2012)
The influence of internet and social media on
purchasing decisions in Egypt and a comparison
between Egypt and Kuwait
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
New directions in cryptanalysis of block ciphers.
by: RezaeiPour , Davood, et al.
Published: (2009)
by: RezaeiPour , Davood, et al.
Published: (2009)
Mathematical aspects of selected block ciphers
by: Alqarni, Yazeed Saeed
Published: (2015)
by: Alqarni, Yazeed Saeed
Published: (2015)
SCDSP: a novel stream cipher with dynamic structure and parameters
by: Mohamed Eljadi, Fardous, et al.
Published: (2015)
by: Mohamed Eljadi, Fardous, et al.
Published: (2015)
Rivest-Shamir-Adleman (RSA)
by: Mohammed Hayek, Iqram, et al.
Published: (2011)
by: Mohammed Hayek, Iqram, et al.
Published: (2011)
Cryptanalysis of RSA
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Digital signature algorithm
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Security risk analysis used by Kuwait government sectors
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
Cryptanalysis Of Block Ciphers: Generalization, Extensions And Integration
by: Phan, Raphael Chung Wei
Published: (2005)
by: Phan, Raphael Chung Wei
Published: (2005)
A framework for describing block cipher cryptanalysis
by: Phan, Raphael C. W., et al.
Published: (2006)
by: Phan, Raphael C. W., et al.
Published: (2006)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
A new 128-bit block cipher
by: Mohd Ali, Fakariah Hani
Published: (2009)
by: Mohd Ali, Fakariah Hani
Published: (2009)
A block cipher based on genetic algorithm
by: Zakaria, Nur Hafiza
Published: (2016)
by: Zakaria, Nur Hafiza
Published: (2016)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
Fault Analysis of the KATAN Family of Block Ciphers
by: Abdul Latip, Shekh Faisal
Published: (2012)
by: Abdul Latip, Shekh Faisal
Published: (2012)
Similar Items
-
Enhancing lightweight block cipher algorithm OLBCA
through decreasing cost factor
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2015) -
OLBCA: a new lightweight block cipher algorithm
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2014) -
Improving the cost factor of DLBCA lightweight block cipher algorithm
by: Al-Dabbagh, Sufyan Salim Mahmood, et al.
Published: (2018) -
Enhancement of lightweight block cipher algorithms
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017) -
HISEC: a new lightweight block cipher algorithm
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)