Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks

Z Niu, S Sun, Y Liu, C Li - Annual International Cryptology Conference, 2022 - Springer
Chaskey is deployed in commercial products by some … micro-controller platforms (8-bit AVR,
16-bit MSP, and 32-bit … additions often operate on large words (eg, 32-bit or 64-bit words). In …

Lightweight cryptography for the Internet of Things

A Hassan - Proceedings of the Future Technologies Conference …, 2021 - Springer
… Most of the IoT devices use very low power microcontrollers, so, these devices can give a …
very specialized algorithms, Examples of this classification are Grain, Qarma, and Chaskey. …

: Towards More Efficient and BBB-secure AE From a Single Public Permutation

A Bhattacharjee, R Bhaumik, A Dutta… - Cryptology ePrint Archive, 2023 - eprint.iacr.org
… our proposal on ARM-32 microcontrollers with Chaskey8 [31] and two … on 32-bit
microcontrollers and evaluate its efficiency with respect to … Chaskey: An Efficient MAC Algorithm for …

Improving Differential-Neural Distinguisher Model For DES, Chaskey, and PRESENT

L Zhang, Z Wang - arXiv preprint arXiv:2204.06341, 2022 - arxiv.org
… To capture the features of the internal architecture of the cryptographic algorithm, we add
the … Chaskey: An efficient MAC algorithm for 32-bit microcontrollers. volume 8781 of Lecture …

Implementing CAN bus security by TOUCAN

P Biondi, G Bella, G Costantino… - Proceedings of the …, 2019 - dl.acm.org
… Because the MAC must be truncated to 24 bits, the truncation resistance of Chaskey is a …
Table 1 shows the algorithms used, the board speed and the execution time of each operation …

Lightweight cryptography

M Tehranipoor, N Pundir, N Vashistha… - Hardware Security …, 2022 - Springer
… for 8-bit AVR microcontrollers, and TDES is appropriate for … algorithms optimized separately
for hardware and software, which illustrates the difficulty of designing an efficient algorithm

Analysis of Functional Safety in a secure implementation of CAN Protocol

G Costantino, L Dariz, I Matteucci - 2020 IEEE 18th …, 2020 - ieeexplore.ieee.org
… the Chaskey MAC, which is a very efficient permutation-based MAC algorithm based on …
does not require a nonce and is well suited for 32-bit micro-controllers; furthermore, it is robust …

Hitchhiker's Guide to Secure Checkpointing on Energy-Harvesting Systems

P Sah, M Hicks - Proceedings of the 11th International Workshop on …, 2023 - dl.acm.org
… traces to monitor communication between the microcontroller and external memory chips.
This … implementation of cryptographic algorithm Chaskey [42] and no optimization enabled. …

Cyberattacks and countermeasures for in-vehicle networks

E Aliwa, O Rana, C Perera, P Burnap - ACM computing surveys (CSUR), 2021 - dl.acm.org
… They also use a compression algorithm to improve the efficiency of their … Chaskey MAC
algorithm [91] over limited-capacity computational resources such as a 32-bit microcontroller

Examining vulnerability of hls-designed chaskey-12 circuits to power side-channel attacks

S Inagaki, M Yang, Y Li, K Sakiyama… - … on Quality Electronic …, 2022 - ieeexplore.ieee.org
Chaskey [2] is one of such lightweight MAC algorithms and one of its variants, Chaskey-12 …
Even though mathematically robust cipher algorithms (including Chaskey) are adopted for …