Secure storage—Confidentiality and authentication

R Benadjila, L Khati, D Vergnaud - Computer Science Review, 2022 - Elsevier
Secure disk storage is a rich and complex topic and its study is challenging in theory as well
as in practice. In case of loss or theft of mobile devices (such as laptops and smartphones) …

ELmD: A pipelineable authenticated encryption and its hardware implementation

L Bossuet, N Datta, C Mancillas-López… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Authenticated encryption schemes which resist misuse of nonce at some desired level of
privacy are two-pass or Mac-then-Encrypt constructions (inherently inefficient but provide full …

Efficient and reliable error detection architectures of Hash-Counter-Hash tweakable enciphering schemes

M Mozaffari-Kermani, R Azarderakhsh… - ACM Transactions on …, 2018 - dl.acm.org
Through pseudorandom permutation, tweakable enciphering schemes (TES) constitute
block cipher modes of operation which perform length-preserving computations. The state-of …

FAST: disk encryption and beyond

D Chakraborty, S Ghosh, CM López… - Cryptology ePrint …, 2017 - eprint.iacr.org
This work introduces\sym {FAST} which is a new family of tweakable enciphering schemes.
Several instantiations of\sym {FAST} are described. These are targeted towards two goals …

Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch

C Forler, E List, S Lucks, J Wenzel - Australasian Conference on …, 2016 - Springer
Block-cipher-based authenticated encryption has obtained considerable attention from the
ongoing CAESAR competition. While the focus of CAESAR resides primarily on nonce …

Universal Context Commitment without Ciphertext Expansion

A Bhattacharjee, R Bhaumik, C Dhar - Cryptology ePrint Archive, 2024 - eprint.iacr.org
An ongoing research challenge in symmetric cryptography is to design an authenticated
encryption (AE) with a commitment to the secret key or preferably to the entire context. One …

Fast Low Level Disk Encryption Using FPGAs

D Chakraborty, S Ghosh, C Mancillas-Lopez… - arXiv preprint arXiv …, 2024 - arxiv.org
A fixed length tweakable enciphering scheme (TES) is the appropriate cryptographic
functionality for low level disk encryption. Research on TES over the last two decades have …

Pipelined hardware implementation of COPA, ELmD, and COLM

L Bossuet, C Mancillas-López… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Authenticated encryption algorithms offer privacy, authentication, and data integrity, as well.
In recent years, they have received special attention after the call for submissions of …

Analisis Forensik Digital Memori Volatile untuk Mendapatkan Kunci Enkripsi Aplikasi Dm-Crypt

VAH Firdaus, D Suprianto… - Jurnal Sistem …, 2021 - ejurnal.stmik-budidarma.ac.id
Teknologi enkripsi disk merupakan teknologi yang sangat bermanfaat dalam mengamankan
data. Di sisi lain, enkripsi disk juga dapat digunakan oleh pelaku kejahatan untuk …

[PDF][PDF] Authenticated and resilient disk encryption

M Brož - 2018 - is.muni.cz
Abstract Full Disk Encryption (FDE) is a security feature that is present in many systems–
from mobile devices to encrypted data in the cloud. Transparent onthe-fly encryption of …