Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

ASIC and FPGA comparative study for IoT lightweight hardware security algorithms

N Samir, AS Hussein, M Khaled… - Journal of Circuits …, 2019 - World Scientific
Data security, privacy and authenticity are crucial in wireless data transmission. Low power
consumption is the main requirement for any chip design targeting the Internet of Things …

Lightweight MDS involution matrices

SM Sim, K Khoo, F Oggier, T Peyrin - … FSE 2015, Istanbul, Turkey, March 8 …, 2015 - Springer
In this article, we provide new methods to look for lightweight MDS matrices, and in
particular involutory ones. By proving many new properties and equivalence classes for …

A new structural-differential property of 5-round AES

L Grassi, C Rechberger, S Rønjom - … on the Theory and Applications of …, 2017 - Springer
AES is probably the most widely studied and used block cipher. Also versions with a
reduced number of rounds are used as a building block in many cryptographic schemes, eg …

Shorter linear straight-line programs for MDS matrices

T Kranz, G Leander, K Stoffelen… - IACR Transactions on …, 2017 - tosc.iacr.org
Recently a lot of attention is paid to the search for efficiently implementable MDS matrices for
lightweight symmetric primitives. Most previous work concentrated on locally optimizing the …

[HTML][HTML] A novel 5-bit S-box design for lightweight cryptography algorithms

VA Thakor, MA Razzaque, AD Darji, AR Patel - Journal of Information …, 2023 - Elsevier
Cryptography is one of the techniques to secure communication and data transfer over the
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …

Lightweight MDS generalized circulant matrices

M Liu, SM Sim - International Conference on Fast Software Encryption, 2016 - Springer
In this article, we analyze the circulant structure of generalized circulant matrices to reduce
the search space for finding lightweight MDS matrices. We first show that the implementation …

Optimizing S-box implementations for several criteria using SAT solvers

K Stoffelen - International Conference on Fast Software Encryption, 2016 - Springer
We explore the feasibility of applying SAT solvers to optimizing implementations of small
functions such as S-boxes for multiple optimization criteria, eg, the number of nonlinear …

Sponge-based control-flow protection for IoT devices

M Werner, T Unterluggauer… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Embedded devices in the Internet of Things (IoT) face a wide variety of security challenges.
For example, software attackers perform code injection and code-reuse attacks on their …

Understanding the duplex and its security

B Mennink - Cryptology ePrint Archive, 2022 - eprint.iacr.org
At SAC 2011, Bertoni et al. introduced the keyed duplex construction as a tool to build
permutation based authenticated encryption schemes. The construction was generalized to …