Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
Online authenticated-encryption and its nonce-reuse misuse-resistance
A definition of online authenticated-encryption (OAE), call it OAE1, was given by
Fleischmann, Forler, and Lucks (2012). It has become a popular definitional target because …
Fleischmann, Forler, and Lucks (2012). It has become a popular definitional target because …
Twisted polynomials and forgery attacks on GCM
Polynomial hashing as an instantiation of universal hashing is a widely employed method
for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous …
for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous …
Jammin'on the deck
Currently, a vast majority of symmetric-key cryptographic schemes are built as block cipher
modes. The block cipher is designed to be hard to distinguish from a random permutation …
modes. The block cipher is designed to be hard to distinguish from a random permutation …
A study of authentication encryption algorithms (poet, deoxys, aez, morus, acorn, aegis, aes-gcm) for automotive security
S Sharaf, H Mostafa - 2018 30th International Conference on …, 2018 - ieeexplore.ieee.org
Connected and autonomous cars present a major challenge for securing vehicles against
outside or inside attacks which may affect the safety of the driver. In this paper there is a …
outside or inside attacks which may affect the safety of the driver. In this paper there is a …
[PDF][PDF] Software Benchmarking of the 2nd round CAESAR Candidates.
Software Benchmarking of the 2nd round CAESAR Candidates Page 1 Software
Benchmarking of the 2nd round CAESAR Candidates Ralph Ankele1, Robin Ankele2 …
Benchmarking of the 2nd round CAESAR Candidates Ralph Ankele1, Robin Ankele2 …
RTL implementations and FPGA benchmarking of selected CAESAR Round Two authenticated ciphers
Authenticated ciphers are cryptographic transformations which combine the functionality of
confidentiality, integrity, and authentication. This research uses register transfer-level (RTL) …
confidentiality, integrity, and authentication. This research uses register transfer-level (RTL) …
[PDF][PDF] Advanced Lightweight Cryptography for Automotive Security: Surveys, Challenges and Solutions.
P Tran, DC Nguyen - IoTBDS, 2022 - scitepress.org
Recently, automotive embedded systems have become strong principles of computing,
along with an increasing need for secure communication. The rapid development of the V2X …
along with an increasing need for secure communication. The rapid development of the V2X …
[PDF][PDF] On the Hardware Implementation Efficiency of CAESAR Authentication Ciphers for FPGA Devices
N Sklavos, P Kitsos, AG Voyiatzis - 2016 - upcommons.upc.edu
Ciphers, also known as authenticated encryption methods, are the outcome of the marriage
between the fields of mathematics and logic. The association of ciphers and data comprises …
between the fields of mathematics and logic. The association of ciphers and data comprises …
RTL implementations and FPGA benchmarking of three authenticated ciphers competing in CAESAR round two
Authenticated ciphers are cryptographic transformations which combine the functionality of
confidentiality, integrity, and authentication. This research uses register transfer-level (RTL) …
confidentiality, integrity, and authentication. This research uses register transfer-level (RTL) …