1 |
D. Hong, J.-K. Lee, D.-C. Kim, D. Kwon, K. H. Ryu, and D.-G. Lee, "LEA: A 128-bit block cipher for fast encryption on common processors," In Information Security Applications, WISA 2013, pp. 3-27, 2013.
|
2 |
H. Seo, Z. Liu, T. Park, H. Kim, Y. Lee, J. Choi, and H. Kim, "Parallel implementations of LEA," In Information Security and Cryptology, ICISC 2013, pp. 256-274, 2013.
|
3 |
H. Seo and H. Kim, "Low-power encryption algorithm block cipher in JavaScript," Journal of Information and Communication Convergence Engineering, vol. 12, no. 4, pp. 252-256, Dec. 2014.
DOI
|
4 |
H. Seo, Z. Liu, J. Choi, T. Park, and H. Kim, "Compact implementations of LEA block cipher for low-end microprocessors," In Information Security Applications WISA 2015, pp. 28-40, 2015.
|
5 |
H. Seo, T. Park, S. Heo, G. Seo, B. Bae, Z. Hu, L. Zhou, Y. Nogami, Y. Zhu, H. Kim, "Parallel Implementations of LEA, Revisted," In Information Security Applications, WISA 2016, pp. 318-330, 2016.
|
6 |
D. A. Osvik, J. W. Bos, D. Stefan, and D. Canright, "Fast software AES encryption," In Fast Software Encryption FSE 2010, pp. 75-93, 2010.
|
7 |
T. Park, H. Seo, H, Kim, "Parallel Implementations of SIMON and SPECK," IEEE International Conference on Platform Technology and Service, pp. 1-6, 2016.
|