Conclusion
Simple algorithm
simple round functions
basic operations
Good security
against DC and LC
against other methods
Efficient implementation
flexible, low hardware requirement
potentially very good ASIC implementation
Previous slide
Back to first slide
View graphic version