Table of Contents
CRYPTON
Introduction
Basic Operations
Overall Block Diagram
Confusion Method
Confusion Method(cont’d)
Confusion Method(cont’d)
Diffusion Method
Diffusion Method(cont’d)
Round Functions
Encryption and Decryption
Key Scheduling
Key Scheduling(cont’d)
Performance
Hardware Efficiency
Security
Security(cont’d)
Conclusion
|
Author: Xiao Yang
|