CINNAMON: A module for AUTOSAR secure onboard communication

G Bella, P Biondi, G Costantino… - 2020 16th European …, 2020 - ieeexplore.ieee.org
algorithm. This parameter identifies which MAC algorithm of the family is used. … Our initial
choice to use Chaskey as a MAC function upon the basis of its specifications was a lucky one. …

Compact LEA and HIGHT implementations on 8-bit AVR and 16-bit MSP processors

H Seo, K An, H Kwon - … : 19th International Conference, WISA 2018, Jeju …, 2019 - Springer
… The other block ciphers, including SPECK and Chaskey, … This is well known 32-bit optimization
of using precomputed … of round key generation are given in Algorithm 1. The round key …

Do NOT misuse the markov cipher assumption-automatic search for differential and impossible differential characteristics in ARX ciphers

Z Xu, Y Li, L Jiao, M Wang, W Meier - Cryptology ePrint Archive, 2022 - eprint.iacr.org
… , and the round function of Chaskey, we find some invalid DCs … We demonstrate the proposed
algorithm on block ciphers … The permutation operates on four 32-bit words and consists …

[HTML][HTML] BLE-based secure tracking system proposal

C Hernández-Goya, R Aguasca-Colomo… - Wireless …, 2023 - Springer
… defined on 32-bit ARX (Add-… Chaskey an appropriate selection for this project are detailed
in [29]. For this implementation, the algorithm performs 16 iterations, and the generated MAC

Rotational Differential‐Linear Attack on Chaskey

Y Qin, G Wang, G Zhang - Security and Communication …, 2022 - Wiley Online Library
… authentication code algorithmChaskey—by … Chaskey, proposed by Nicky Mouha et
al., is a very efficient Message Authentication Code (MAC) algorithm for 32-bit microcontrollers

Dynamic Reduced-Round TLS Extension for Secure and Energy-Saving Communication of IoT Devices

Q Varo, W Lardier, J Yan - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
… , are microcontrollers32-bit blocks for 128-bit AES. The use of fewer encryption rounds
also allows some ciphers to reduce the computational complexity considerably, eg, the Chaskey

Are you secure in your car? poster

G Bella, P Biondi, G Costantino… - Proceedings of the 12th …, 2019 - dl.acm.org
… TOUCAN leverages the Chaskey MAC, which is a very efficient permutation-based … Chaskey:
An Efficient MAC Algorithm for 32-bit Microcontrollers. In Selected Areas in Cryptography – …

Gimli encryption in 715.9 psec

S Ghosh, M Kounavis, S Deutsch - Cryptology ePrint Archive, 2020 - eprint.iacr.org
… [23] and Chaskey [25] are examples of efficient permutation … microcontrollers, 32 bit high
end embedded microcontrollers, … , Chaskey: An efficient MAC algorithm for 32-bit micro-…

[PDF][PDF] LS-AODV: A Routing Protocol Based On Lightweight Cryptographic Techniques for a FANET of Nano Drones

CW Vernon - 2022 - apps.dtic.mil
… Operating on smaller blocks allows Chaskey-12 to efficiently … a concern for algorithms
running on 32-bit microcontrollers. … cipher algorithm and the Chaskey-12 MAC algorithm into the …

[PDF][PDF] BRIGHT-Proposed Family of Lightweight Block Ciphers for IoT-Enabled Smart Environment

D Sehrawat, NS Gill - International Journal of Innovative …, 2019 - researchgate.net
… To improve the efficiency of an algorithm, usually, a tradeoff … exceeds that of SIMON in
both 32-bit and 64-bit processors. … for better performance on microcontrollers. The notion for …