REFERENCES
- Afzal, S., Waqas, U., Mubeen, M.A., Yousaf, M. 2015. Statistical analysis of key schedule algorithms of different block ciphers, Science International, 27.
- Amiruddin, A., Ratna, A.A.P., Sari, R. 2019. Construction and analysis of key generation algorithms based on modified Fibonacci and scrambling factors for privacy preservation. International Journal of Network Security, 21, 250–258.
- Avanzi, R. 2016. A salad of block ciphers-the state of the art in block ciphers and their analysis (http://eprint.iacr.org/2016/1171.pdf, 2016).
- Bakiri, M., Guyeux, C., Couchot, J.F., Oudjida, A.K. 2018. Survey on hardware implementation of random number generators on FPGA: Theory and experimental analyses. Computer Science Review, Elsevier, 27, 135-153. hal-02182827, 4, 5–13.
- Barreto, P., Rijmen, V. 2000. The khazad legacy-level block cipher, Primitive submitted to NESSIE, 97.
- Biryukov, A., Nikoli´c, I. 2011. Search for related-key differential characteristics in DES-like ciphers. In Fast Software Encryption, 6733, 18–34.
- Blumenthal, U., Bellovin, S.M. 1996. A better key schedule for DES-like ciphers, in Proceedings of the Pragocrypt, Prague, Czech Republic.
- Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C. 2007. PRESENT: an ultra-lightweight block cipher, in Cryptographic Hardware and Embedded Systems—CHES 2007, 450–466, Springer, Berlin, Heidelberg.
- Choi, P., Lee, M.‐K., Kim, D.K. 2017. Fast compact true random number generator based on multiple sampling. Electronics Letters, 53, 841–843.
- Cusick, T.W., Stanica, P. 2017. Chapter 2 - Fourier analysis of Boolean functions, editor(s): Thomas W. Cusick, Pantelimon Stanica, cryptographic Boolean functions and applications (Second Edition), Academic Press, 7–29, ISBN 9780128111291, https://doi.org/10.1016/B978-0-12-811129-1.00002-X.
- Daemen, J. 1995. Cipher and hash function design strategies based on linear and differential cryptanalysis, Ph.D. dissertation, Doctoral Dissertation, KU Leuven.
- Daemen, J., Rene, G., Joos, V. 1993. Weak keys for IDEA, Annual International Cryptology Conference, 224–231, Springer, Berlin, Heidelberg.
- Guo, J., Peyrin, T., Poschmann, A., Robshaw, M. 2011. The LED block cipher. In CHES 2011, 6917, 326–341.
- Gupta, R., Pandey, A., Baghel, R.K. 2019. FPGA implementation of chaos‐based high‐speed true random number generator. International Journal of Numerical Modelling: Electronic Networks, Devices and Fields. 32, e2604. https://doi.org/10.1002/jnm.2604
- Harmouch, Y., El Kouch, R. 2019. The benefit of using chaos in key schedule algorithm, Journal of Information Security and Applications, 45, 143–155.
- Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B.S., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J., Chee, S. 2006. HIGHT: A new block cipher suitable for low-resource device. In CHES, 4249, 46–59. Springer.
- Jaya Sudha, K., Jaya Rani, G., Mirza Shafi Sahahsavar, 2015. Generation of uniform random numbers using look up table as shift register, International Journal of Science, Engineering and Technology Research (IJSETR), 4.
- Justin, R., Mathew, B.K., Abe, S. 2016. FPGA implementation of high quality random number generator using LUT based shift registers, Procedia Technology, 24, 1155–1162, ISSN 2212-0173. https://doi.org/10.1016/j.protcy.2016.05.069.
- Kim, C.H. 2011. Improved differential fault analysis on AES key schedule, IEEE Transactions on Information Forensics and Security, 7, 41–50.
- Knudsen, L., Leander, G., Poschmann, A., Matthew, R.J.B. 2010. PRINTcipher: A block cipher for IC-printing. In CHES 2010, 6225, 16–32.
- Knudsen, L.R., Mathiassen, J.E. 2004. On the role of key schedules in attacks on iterated ciphers, in European Symposium on Research in Computer Security, 322–334, Springer, Berlin, Heidelberg.
- Kumar, V.G.K., Rai, C.S. 2020. FPGA implementation of simple encryption scheme for resource-constrained devices, International Journal of Advanced Trends in Computer Science and Engineering, 9. https://doi.org/10.30534/ijatcse/2020/213942020.
- Kumar, V.G.K., Rai, C.S. 2021. Efficient implementation of cryptographic arithmetic primitives using reversible logic and Vedic mathematics. Journal of The Institution of Engineers (India): Series B 102, 59–74. https://doi.org/10.1007/s40031-020-00518-w.
- Matsumoto, M., Kurita, Y. 1992. Twisted GFSR generators. ACM Transactions on Modeling and Computer Simulation, 2, 179–194. DOI: https://doi.org/10.1145/146382.146383.
- May, L., Henricksen, M., Millan, W., Carter, G., Dawson, E. 2002. Strengthening the key schedule of the AES, in Information Security and Privacy, 226–240, Springer, Berlin Heidelberg.
- McKay, K.A., Bassham, L., Turan, M.S., Mouha, N. 2016. DRAFT NISTIR 8114: Report on lightweight cryptography, National Institute of Standards and Technology Internal Report 8114.
- Mitchell, R.L., Stone, C.R. 1977. Table-lookup methods for generating arbitrary random numbers, in IEEE Transactions on Computers, C-26, 1006–1008, doi: 10.1109/TC.1977.1674735.
- NIST, 2010. A statistical test suite for random and pseudorandom number generators for cryptographic applications. http://csrc.nist.gov/publications/nistpubs/800-22-rev1a/SP800-22rev1a.pdf.
- Paje, R.E.J., Sison, A.M., Medina, R.P. 2019. Multidimensional key RC6 algorithm, in Proceedings of the 3rd International Conference on Cryptography, Security and Privacy—ICCSP’19, 33–38, Kuala Lumpur, Malaysia.
- Seok, B., Lee, C. 2019. Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor. International Journal of Distributed Sensor Networks. https://doi.org/10.1177/1550147719874180.
- Simion, E. 2015. The relevance of statistical tests in cryptography, IEEE Security & Privacy, 13, 66–70.
- Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E. 2013. TWINE: A lightweight block cipher for multiple platforms. In Selected Areas in Cryptography, 7707, 339–354.
- Sys, M., Klinec, D., Kubıcek, K., Svenda, P. 2017. BoolTest: the fast randomness testing strategy based on boolean functions with application to DES, 3-DES, MD5, MD6, and SHA-256, in International Conference on E-Business and Telecommunications, 123–149, Springer, Cham, Switzerland.
- Tezuka, S. 1995. Linear congruential generators. In: Uniform Random Numbers. The Springer International Series in Engineering and Computer Science (Discrete Event Dynamic Systems), 315. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-2317-8_3.
- Thomas, D.B., Luk, W. 2013. The LUT-SR family of uniform random number generators for FPGA architectures, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 21, 761–770.
- Ukrop, M. 2016. Randomness analysis in authenticated encryption systems, Ph.D. thesis, Masarykovauniverzita, Fakultainformatiky, Brno, Czechia.
- Usman, M., Ahmed, I., Aslam, M.I., Khan, S., Shah, U.A. 2017. SIT: A lightweight encryption algorithm for secure internet of things, International Journal of Advanced Computer Science and Applications, 8.
- Wetzels, J., Bokslag, W. 2015. Simple SIMON: FPGA implementations of the SIMON 64/128 block cipher. Cryptography Engineering Kerckhoffs Institute. 1, 1–20.
- Wu, W., Zhang, L. 2011. LBlock: A lightweight block cipher. In Applied Cryptography and Network Security, 6715, 327–344.
- Wu, X., Li, S. 2017. A new digital true random number generator based on delay chain feedback loop, IEEE conference 978‐1‐4673‐6853‐7/17/$31.00