Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES (L) and other bit-oriented block …

S Sun, L Hu, P Wang, K Qiao, X Ma, L Song - Advances in Cryptology …, 2014 - Springer
We propose two systematic methods to describe the differential property of an S-box with
linear inequalities based on logical condition modelling and computational geometry …

ASIC and FPGA comparative study for IoT lightweight hardware security algorithms

N Samir, AS Hussein, M Khaled… - Journal of Circuits …, 2019 - World Scientific
Data security, privacy and authenticity are crucial in wireless data transmission. Low power
consumption is the main requirement for any chip design targeting the Internet of Things …

Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with …

S Sun, L Hu, M Wang, P Wang, K Qiao, X Ma… - Cryptology ePrint …, 2014 - eprint.iacr.org
In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of the
differential and linear behavior of a wide range of block ciphers. We point out that the …

Lightweight MDS involution matrices

SM Sim, K Khoo, F Oggier, T Peyrin - … FSE 2015, Istanbul, Turkey, March 8 …, 2015 - Springer
In this article, we provide new methods to look for lightweight MDS matrices, and in
particular involutory ones. By proving many new properties and equivalence classes for …

A new structural-differential property of 5-round AES

L Grassi, C Rechberger, S Rønjom - … on the Theory and Applications of …, 2017 - Springer
AES is probably the most widely studied and used block cipher. Also versions with a
reduced number of rounds are used as a building block in many cryptographic schemes, eg …

Shorter linear straight-line programs for MDS matrices

T Kranz, G Leander, K Stoffelen… - IACR Transactions on …, 2017 - tosc.iacr.org
Recently a lot of attention is paid to the search for efficiently implementable MDS matrices for
lightweight symmetric primitives. Most previous work concentrated on locally optimizing the …

[HTML][HTML] A novel 5-bit S-box design for lightweight cryptography algorithms

VA Thakor, MA Razzaque, AD Darji, AR Patel - Journal of Information …, 2023 - Elsevier
Cryptography is one of the techniques to secure communication and data transfer over the
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …

Lightweight MDS generalized circulant matrices

M Liu, SM Sim - International Conference on Fast Software Encryption, 2016 - Springer
In this article, we analyze the circulant structure of generalized circulant matrices to reduce
the search space for finding lightweight MDS matrices. We first show that the implementation …

ISAP–towards side-channel secure authenticated encryption

C Dobraunig, M Eichlseder, S Mangard… - IACR Transactions on …, 2017 - tosc.iacr.org
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a
serious threat to cryptographic implementations. One approach to counteract such attacks …