Counter-in-tweak: authenticated encryption modes for tweakable block ciphers

T Peyrin, Y Seurin - Annual International Cryptology Conference, 2016 - Springer
Abstract We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable
block cipher into a nonce-based authenticated encryption scheme (with associated data) …

A statistical method for robust 3D surface reconstruction from sparse data

V Blanz, A Mehl, T Vetter… - … Symposium on 3D Data …, 2004 - ieeexplore.ieee.org
General information about a class of objects, such as human faces or teeth, can help to
solve the otherwise ill-posed problem of reconstructing a complete surface from sparse 3D …

ZMAC: a fast tweakable block cipher mode for highly secure message authentication

T Iwata, K Minematsu, T Peyrin, Y Seurin - Annual international cryptology …, 2017 - Springer
We propose a new mode of operation called ZMAC allowing to construct a (stateless and
deterministic) message authentication code (MAC) from a tweakable block cipher (TBC) …

ZOCB and ZOTR: tweakable blockcipher modes for authenticated encryption with full absorption

Z Bao, J Guo, T Iwata, K Minematsu - IACR Transactions on Symmetric …, 2019 - tosc.iacr.org
We define ZOCB and ZOTR for nonce-based authenticated encryption with associated data,
and analyze their provable security. These schemes use a tweakable blockcipher (TBC) as …

Analysis and inner-round pipelined implementation of selected parallelizable CAESAR competition candidates

S Deshpande, K Gaj - 2017 Euromicro Conference on Digital …, 2017 - ieeexplore.ieee.org
In this paper, we have first characterized candidates of the Competition for Authenticated
Encryption, Security, Applicability, and Robustness (CAESAR) from the point of view of their …

Cryptographie légère intrinsèquement résistante aux attaques physiques pour l'Internet des objets.

B Lac - 2018 - theses.hal.science
L'Internet des objets a de nombreux domaines applicatifs et offre ainsi un potentiel immense
pour les entreprises, les industries et les utilisateurs. Notre étude porte sur les besoins en …

[PDF][PDF] Security Considerations for VLSI-Based Symmetric Encryption Devices

M Mühlberghuber - 2016 - research-collection.ethz.ch
The development and fabrication of secure, trustworthy, and efficient technical devices
becomes an increasingly difficult task because of the high complexity of today's systems …

[引用][C] Lightweight authenticated encryption for FPGAs

U Mamidi - 2016