A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is
Security of Ubiquitous Computing Systems
AbstractThe main objective of this chapter is to offer to practitioners, researchers and all interested parties a brief categorized catalog of existing lightweight symmetric primitives with their main ... In particular, the reason behind why modern lightweight block cipher designs have in the last decade overwhelmingly dominated stream cipher design is analyzed in terms of security against tradeoff attacks ... Feistel  ). • Add-Rotate-XOR (ARX)-only three operations are used: modular addition, rotation and XOR. • Generalized Feistel Network (GFN)-divides the input block into n parts, and each round consists ...doi:10.1007/978-3-030-10591-4_2 fatcat:d2gtrxu225asnmubp5ezfloz3m