Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

Online authenticated-encryption and its nonce-reuse misuse-resistance

VT Hoang, R Reyhanitabar, P Rogaway… - Advances in Cryptology …, 2015 - Springer
A definition of online authenticated-encryption (OAE), call it OAE1, was given by
Fleischmann, Forler, and Lucks (2012). It has become a popular definitional target because …

Twisted polynomials and forgery attacks on GCM

MA Abdelraheem, P Beelen, A Bogdanov… - Advances in Cryptology …, 2015 - Springer
Polynomial hashing as an instantiation of universal hashing is a widely employed method
for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous …

Jammin'on the deck

N Băcuieți, J Daemen, S Hoffert, G Van Assche… - … Conference on the …, 2022 - Springer
Currently, a vast majority of symmetric-key cryptographic schemes are built as block cipher
modes. The block cipher is designed to be hard to distinguish from a random permutation …

A study of authentication encryption algorithms (poet, deoxys, aez, morus, acorn, aegis, aes-gcm) for automotive security

S Sharaf, H Mostafa - 2018 30th International Conference on …, 2018 - ieeexplore.ieee.org
Connected and autonomous cars present a major challenge for securing vehicles against
outside or inside attacks which may affect the safety of the driver. In this paper there is a …

[PDF][PDF] Software Benchmarking of the 2nd round CAESAR Candidates.

R Ankele, R Ankele - IACR Cryptol. ePrint Arch., 2016 - ccccspeed.win.tue.nl
Software Benchmarking of the 2nd round CAESAR Candidates Page 1 Software
Benchmarking of the 2nd round CAESAR Candidates Ralph Ankele1, Robin Ankele2 …

RTL implementations and FPGA benchmarking of selected CAESAR Round Two authenticated ciphers

W Diehl, K Gaj - Microprocessors and Microsystems, 2017 - Elsevier
Authenticated ciphers are cryptographic transformations which combine the functionality of
confidentiality, integrity, and authentication. This research uses register transfer-level (RTL) …

[PDF][PDF] Advanced Lightweight Cryptography for Automotive Security: Surveys, Challenges and Solutions.

P Tran, DC Nguyen - IoTBDS, 2022 - scitepress.org
Recently, automotive embedded systems have become strong principles of computing,
along with an increasing need for secure communication. The rapid development of the V2X …

[PDF][PDF] On the Hardware Implementation Efficiency of CAESAR Authentication Ciphers for FPGA Devices

N Sklavos, P Kitsos, AG Voyiatzis - 2016 - upcommons.upc.edu
Ciphers, also known as authenticated encryption methods, are the outcome of the marriage
between the fields of mathematics and logic. The association of ciphers and data comprises …

RTL implementations and FPGA benchmarking of three authenticated ciphers competing in CAESAR round two

W Diehl, K Gaj - 2016 Euromicro Conference on Digital System …, 2016 - ieeexplore.ieee.org
Authenticated ciphers are cryptographic transformations which combine the functionality of
confidentiality, integrity, and authentication. This research uses register transfer-level (RTL) …