Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, C Calik… - 2021 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …

Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter

O Bronchain, FX Standaert - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
We explore the concrete side-channel security provided by state-of-theart higher-order
masked software implementations of the AES and the (candidate to the NIST Lightweight …

FPGA benchmarking of round 2 candidates in the NIST lightweight cryptography standardization process: Methodology, metrics, tools, and results

K Mohajerani, R Haeussler, R Nagpal… - Cryptology ePrint …, 2020 - eprint.iacr.org
Twenty seven Round 2 candidates in the NIST Lightweight Cryptography (LWC) process
have been implemented in hardware by groups from all over the world. All implementations …

Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle

D Bellizia, O Bronchain, G Cassiers, V Grosso… - Advances in Cryptology …, 2020 - Springer
Triggered by the increasing deployment of embedded cryptographic devices (eg, for the
IoT), the design of authentication, encryption and authenticated encryption schemes …

Hardware implementations of NIST lightweight cryptographic candidates: A first look

B Rezvani, F Coleman, S Sachin, W Diehl - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Achieving security in the Internet of Things (IoT) is challenging. The need for lightweight yet
robust cryptographic solutions suitable for the IoT calls for improved design and …

Triplex: an efficient and one-pass leakage-resistant mode of operation

Y Shen, T Peters, FX Standaert, G Cassiers… - IACR Transactions on …, 2022 - tches.iacr.org
This paper introduces and analyzes Triplex, a leakage-resistant mode of operation based on
Tweakable Block Ciphers (TBCs) with 2n-bit tweaks. Triplex enjoys beyond-birthday …

Scalable and efficient hardware architectures for authenticated encryption in IoT applications

S Khan, WK Lee, SO Hwang - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is a key enabling technology, wherein sensors are placed
ubiquitously to collect and exchange information with their surrounding nodes. Due to the …

Efficient regression-based linear discriminant analysis for side-channel security evaluations: Towards analytical attacks against 32-bit implementations

G Cassiers, H Devillez, FX Standaert… - IACR Transactions on …, 2023 - tches.iacr.org
bit software implementations become increasingly popular for embedded security
applications. As a result, profiling 32-bit target intermediate values becomes increasingly …

Secret can be public: low-memory AEAD mode for high-order masking

Y Naito, Y Sasaki, T Sugawara - Annual International Cryptology …, 2022 - Springer
We propose a new AEAD mode of operation for an efficient countermeasure against side-
channel attacks. Our mode achieves the smallest memory with high-order masking, by …