Counter-in-tweak: authenticated encryption modes for tweakable block ciphers
Abstract We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable
block cipher into a nonce-based authenticated encryption scheme (with associated data) …
block cipher into a nonce-based authenticated encryption scheme (with associated data) …
A statistical method for robust 3D surface reconstruction from sparse data
General information about a class of objects, such as human faces or teeth, can help to
solve the otherwise ill-posed problem of reconstructing a complete surface from sparse 3D …
solve the otherwise ill-posed problem of reconstructing a complete surface from sparse 3D …
ZMAC: a fast tweakable block cipher mode for highly secure message authentication
We propose a new mode of operation called ZMAC allowing to construct a (stateless and
deterministic) message authentication code (MAC) from a tweakable block cipher (TBC) …
deterministic) message authentication code (MAC) from a tweakable block cipher (TBC) …
ZOCB and ZOTR: tweakable blockcipher modes for authenticated encryption with full absorption
We define ZOCB and ZOTR for nonce-based authenticated encryption with associated data,
and analyze their provable security. These schemes use a tweakable blockcipher (TBC) as …
and analyze their provable security. These schemes use a tweakable blockcipher (TBC) as …
Analysis and inner-round pipelined implementation of selected parallelizable CAESAR competition candidates
S Deshpande, K Gaj - 2017 Euromicro Conference on Digital …, 2017 - ieeexplore.ieee.org
In this paper, we have first characterized candidates of the Competition for Authenticated
Encryption, Security, Applicability, and Robustness (CAESAR) from the point of view of their …
Encryption, Security, Applicability, and Robustness (CAESAR) from the point of view of their …
Cryptographie légère intrinsèquement résistante aux attaques physiques pour l'Internet des objets.
B Lac - 2018 - theses.hal.science
L'Internet des objets a de nombreux domaines applicatifs et offre ainsi un potentiel immense
pour les entreprises, les industries et les utilisateurs. Notre étude porte sur les besoins en …
pour les entreprises, les industries et les utilisateurs. Notre étude porte sur les besoins en …
[PDF][PDF] Security Considerations for VLSI-Based Symmetric Encryption Devices
M Mühlberghuber - 2016 - research-collection.ethz.ch
The development and fabrication of secure, trustworthy, and efficient technical devices
becomes an increasingly difficult task because of the high complexity of today's systems …
becomes an increasingly difficult task because of the high complexity of today's systems …