Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
ASIC and FPGA comparative study for IoT lightweight hardware security algorithms
N Samir, AS Hussein, M Khaled… - Journal of Circuits …, 2019 - World Scientific
Data security, privacy and authenticity are crucial in wireless data transmission. Low power
consumption is the main requirement for any chip design targeting the Internet of Things …
consumption is the main requirement for any chip design targeting the Internet of Things …
Lightweight MDS involution matrices
In this article, we provide new methods to look for lightweight MDS matrices, and in
particular involutory ones. By proving many new properties and equivalence classes for …
particular involutory ones. By proving many new properties and equivalence classes for …
A new structural-differential property of 5-round AES
L Grassi, C Rechberger, S Rønjom - … on the Theory and Applications of …, 2017 - Springer
AES is probably the most widely studied and used block cipher. Also versions with a
reduced number of rounds are used as a building block in many cryptographic schemes, eg …
reduced number of rounds are used as a building block in many cryptographic schemes, eg …
Shorter linear straight-line programs for MDS matrices
Recently a lot of attention is paid to the search for efficiently implementable MDS matrices for
lightweight symmetric primitives. Most previous work concentrated on locally optimizing the …
lightweight symmetric primitives. Most previous work concentrated on locally optimizing the …
[HTML][HTML] A novel 5-bit S-box design for lightweight cryptography algorithms
VA Thakor, MA Razzaque, AD Darji, AR Patel - Journal of Information …, 2023 - Elsevier
Cryptography is one of the techniques to secure communication and data transfer over the
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …
Lightweight MDS generalized circulant matrices
M Liu, SM Sim - International Conference on Fast Software Encryption, 2016 - Springer
In this article, we analyze the circulant structure of generalized circulant matrices to reduce
the search space for finding lightweight MDS matrices. We first show that the implementation …
the search space for finding lightweight MDS matrices. We first show that the implementation …
Optimizing S-box implementations for several criteria using SAT solvers
K Stoffelen - International Conference on Fast Software Encryption, 2016 - Springer
We explore the feasibility of applying SAT solvers to optimizing implementations of small
functions such as S-boxes for multiple optimization criteria, eg, the number of nonlinear …
functions such as S-boxes for multiple optimization criteria, eg, the number of nonlinear …
Sponge-based control-flow protection for IoT devices
M Werner, T Unterluggauer… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Embedded devices in the Internet of Things (IoT) face a wide variety of security challenges.
For example, software attackers perform code injection and code-reuse attacks on their …
For example, software attackers perform code injection and code-reuse attacks on their …
Understanding the duplex and its security
B Mennink - Cryptology ePrint Archive, 2022 - eprint.iacr.org
At SAC 2011, Bertoni et al. introduced the keyed duplex construction as a tool to build
permutation based authenticated encryption schemes. The construction was generalized to …
permutation based authenticated encryption schemes. The construction was generalized to …