Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …
standardization process to select one or more Authenticated Encryption with Associated …
Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter
O Bronchain, FX Standaert - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
We explore the concrete side-channel security provided by state-of-theart higher-order
masked software implementations of the AES and the (candidate to the NIST Lightweight …
masked software implementations of the AES and the (candidate to the NIST Lightweight …
FPGA benchmarking of round 2 candidates in the NIST lightweight cryptography standardization process: Methodology, metrics, tools, and results
K Mohajerani, R Haeussler, R Nagpal… - Cryptology ePrint …, 2020 - eprint.iacr.org
Twenty seven Round 2 candidates in the NIST Lightweight Cryptography (LWC) process
have been implemented in hardware by groups from all over the world. All implementations …
have been implemented in hardware by groups from all over the world. All implementations …
Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle
Triggered by the increasing deployment of embedded cryptographic devices (eg, for the
IoT), the design of authentication, encryption and authenticated encryption schemes …
IoT), the design of authentication, encryption and authenticated encryption schemes …
Hardware implementations of NIST lightweight cryptographic candidates: A first look
Achieving security in the Internet of Things (IoT) is challenging. The need for lightweight yet
robust cryptographic solutions suitable for the IoT calls for improved design and …
robust cryptographic solutions suitable for the IoT calls for improved design and …
Triplex: an efficient and one-pass leakage-resistant mode of operation
This paper introduces and analyzes Triplex, a leakage-resistant mode of operation based on
Tweakable Block Ciphers (TBCs) with 2n-bit tweaks. Triplex enjoys beyond-birthday …
Tweakable Block Ciphers (TBCs) with 2n-bit tweaks. Triplex enjoys beyond-birthday …
Scalable and efficient hardware architectures for authenticated encryption in IoT applications
Internet of Things (IoT) is a key enabling technology, wherein sensors are placed
ubiquitously to collect and exchange information with their surrounding nodes. Due to the …
ubiquitously to collect and exchange information with their surrounding nodes. Due to the …
Efficient regression-based linear discriminant analysis for side-channel security evaluations: Towards analytical attacks against 32-bit implementations
bit software implementations become increasingly popular for embedded security
applications. As a result, profiling 32-bit target intermediate values becomes increasingly …
applications. As a result, profiling 32-bit target intermediate values becomes increasingly …
Secret can be public: low-memory AEAD mode for high-order masking
Y Naito, Y Sasaki, T Sugawara - Annual International Cryptology …, 2022 - Springer
We propose a new AEAD mode of operation for an efficient countermeasure against side-
channel attacks. Our mode achieves the smallest memory with high-order masking, by …
channel attacks. Our mode achieves the smallest memory with high-order masking, by …