CINNAMON: A module for AUTOSAR secure onboard communication
… algorithm. This parameter identifies which MAC algorithm of the family is used. … Our initial
choice to use Chaskey as a MAC function upon the basis of its specifications was a lucky one. …
choice to use Chaskey as a MAC function upon the basis of its specifications was a lucky one. …
Compact LEA and HIGHT implementations on 8-bit AVR and 16-bit MSP processors
… The other block ciphers, including SPECK and Chaskey, … This is well known 32-bit optimization
of using precomputed … of round key generation are given in Algorithm 1. The round key …
of using precomputed … of round key generation are given in Algorithm 1. The round key …
Do NOT misuse the markov cipher assumption-automatic search for differential and impossible differential characteristics in ARX ciphers
Z Xu, Y Li, L Jiao, M Wang, W Meier - Cryptology ePrint Archive, 2022 - eprint.iacr.org
… , and the round function of Chaskey, we find some invalid DCs … We demonstrate the proposed
algorithm on block ciphers … The permutation operates on four 32-bit words and consists …
algorithm on block ciphers … The permutation operates on four 32-bit words and consists …
[HTML][HTML] BLE-based secure tracking system proposal
C Hernández-Goya, R Aguasca-Colomo… - Wireless …, 2023 - Springer
… defined on 32-bit ARX (Add-… Chaskey an appropriate selection for this project are detailed
in [29]. For this implementation, the algorithm performs 16 iterations, and the generated MAC …
in [29]. For this implementation, the algorithm performs 16 iterations, and the generated MAC …
Rotational Differential‐Linear Attack on Chaskey
Y Qin, G Wang, G Zhang - Security and Communication …, 2022 - Wiley Online Library
… authentication code algorithm—Chaskey—by … Chaskey, proposed by Nicky Mouha et
al., is a very efficient Message Authentication Code (MAC) algorithm for 32-bit microcontrollers…
al., is a very efficient Message Authentication Code (MAC) algorithm for 32-bit microcontrollers…
Dynamic Reduced-Round TLS Extension for Secure and Energy-Saving Communication of IoT Devices
Q Varo, W Lardier, J Yan - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
… , are microcontrollers … 32-bit blocks for 128-bit AES. The use of fewer encryption rounds
also allows some ciphers to reduce the computational complexity considerably, eg, the Chaskey …
also allows some ciphers to reduce the computational complexity considerably, eg, the Chaskey …
Are you secure in your car? poster
… TOUCAN leverages the Chaskey MAC, which is a very efficient permutation-based … Chaskey:
An Efficient MAC Algorithm for 32-bit Microcontrollers. In Selected Areas in Cryptography – …
An Efficient MAC Algorithm for 32-bit Microcontrollers. In Selected Areas in Cryptography – …
Gimli encryption in 715.9 psec
… [23] and Chaskey [25] are examples of efficient permutation … microcontrollers, 32 bit high
end embedded microcontrollers, … , Chaskey: An efficient MAC algorithm for 32-bit micro-…
end embedded microcontrollers, … , Chaskey: An efficient MAC algorithm for 32-bit micro-…
[PDF][PDF] LS-AODV: A Routing Protocol Based On Lightweight Cryptographic Techniques for a FANET of Nano Drones
CW Vernon - 2022 - apps.dtic.mil
… Operating on smaller blocks allows Chaskey-12 to efficiently … a concern for algorithms
running on 32-bit microcontrollers. … cipher algorithm and the Chaskey-12 MAC algorithm into the …
running on 32-bit microcontrollers. … cipher algorithm and the Chaskey-12 MAC algorithm into the …
[PDF][PDF] BRIGHT-Proposed Family of Lightweight Block Ciphers for IoT-Enabled Smart Environment
D Sehrawat, NS Gill - International Journal of Innovative …, 2019 - researchgate.net
… To improve the efficiency of an algorithm, usually, a tradeoff … exceeds that of SIMON in
both 32-bit and 64-bit processors. … for better performance on microcontrollers. The notion for …
both 32-bit and 64-bit processors. … for better performance on microcontrollers. The notion for …