Suchergebnisse - Authenticated encryption algorithm
-
1
Lightweight and flexible hardware implementation of authenticated encryption algorithm SIMON‐Galois/Counter Mode
ISSN: 0098-9886, 1097-007XVeröffentlicht: Bognor Regis Wiley Subscription Services, Inc 01.12.2023Veröffentlicht in International journal of circuit theory and applications (01.12.2023)“… Summary This brief proposes a new lightweight authenticated encryption algorithm SIMON …”
Volltext
Journal Article -
2
AEUR: authenticated encryption algorithm design based on uBlock round function
ISSN: 1000-436XVeröffentlicht: Editorial Department of Journal on Communications 01.08.2023Veröffentlicht in Tongxin Xuebao (01.08.2023)“… In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR …”
Volltext
Journal Article -
3
AEUR: authenticated encryption algorithm design based on uBlock round function
ISSN: 1000-436XVeröffentlicht: Editorial Department of Journal on Communications 01.08.2023Veröffentlicht in Tongxin Xuebao (01.08.2023)“… In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR …”
Volltext
Journal Article -
4
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128
ISSN: 2190-8508, 2190-8516Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.09.2023Veröffentlicht in Journal of cryptographic engineering (01.09.2023)“… We investigate a technique that needs to apply multiple random faults to the same target location and compare the impact of these faults on the fault-free and …”
Volltext
Journal Article -
5
Architectural Optimization of Parallel Authenticated Encryption Algorithm for Satellite Application
ISSN: 2169-3536, 2169-3536Veröffentlicht: Piscataway IEEE 2020Veröffentlicht in IEEE access (2020)“… Moreover, the Authenticated Encryption (AE) algorithms provide high-speed communication and security services include data encryption, authentication, and integrity …”
Volltext
Journal Article -
6
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM
ISSN: 2214-2126Veröffentlicht: 01.11.2022Veröffentlicht in Journal of information security and applications (01.11.2022)Volltext
Journal Article -
7
Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms
ISSN: 1570-0755, 1573-1332Veröffentlicht: New York Springer US 01.04.2021Veröffentlicht in Quantum information processing (01.04.2021)“… The classic forgery attacks on COPA, AES-COPA and Marble authenticated encryption algorithms need to query about 2 n / 2 times, and their success probability is not high …”
Volltext
Journal Article -
8
Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant Authenticated Encryption Algorithms
ISSN: 1063-8210, 1557-9999Veröffentlicht: New York IEEE 01.05.2019Veröffentlicht in IEEE transactions on very large scale integration (VLSI) systems (01.05.2019)“… This paper presents a performance comparison of new authenticated encryption (AE) algorithms which are aimed at providing better security and resource efficiency compared to existing standards …”
Volltext
Journal Article -
9
Implementing authenticated encryption algorithm MK-3 on FPGA
ISSN: 2155-7586Veröffentlicht: IEEE 01.11.2016Veröffentlicht in MILCOM IEEE Military Communications Conference (01.11.2016)“… Authenticated encryption (AE) algorithms provide both data security and integrity …”
Volltext
Tagungsbericht -
10
Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm
ISSN: 2155-7586Veröffentlicht: IEEE 01.10.2018Veröffentlicht in MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM) (01.10.2018)“… MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction …”
Volltext
Tagungsbericht -
11
Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
ISSN: 2095-9184, 2095-9230Veröffentlicht: Hangzhou Zhejiang University Press 01.12.2018Veröffentlicht in Frontiers of information technology & electronic engineering (01.12.2018)“… The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR …”
Volltext
Journal Article -
12
Energy-harvesting Q-learning secure routing algorithm with authenticated-encryption for WSN
ISSN: 2405-9595, 2405-9595Veröffentlicht: Elsevier 01.12.2023Veröffentlicht in ICT express (01.12.2023)“… To address these issues, we innovatively propose an energy-harvesting Q-learning secure routing algorithm with authenticated-encryption …”
Volltext
Journal Article -
13
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
ISSN: 0933-2790, 1432-1378Veröffentlicht: New York Springer US 01.07.2021Veröffentlicht in Journal of cryptology (01.07.2021)“… In this paper, we provide the specification of Ascon -128 and Ascon -128a. Both authenticated encryption algorithms provide efficient authenticated encryption on resource-constrained devices and on high-end CPUs …”
Volltext
Journal Article -
14
Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN
ISSN: 1939-0114, 1939-0122, 1939-0122Veröffentlicht: Cairo, Egypt Hindawi Publishing Corporation 01.01.2018Veröffentlicht in Security and communication networks (01.01.2018)“… Authenticated encryption is a mechanism to provide these systems with confidentiality, integrity, and authentication of sensitive data …”
Volltext
Journal Article -
15
Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm
Veröffentlicht: Lodz University of Technology 29.06.2023Veröffentlicht in 2023 30th International Conference on Mixed Design of Integrated Circuits and System (MIXDES) (29.06.2023)“… MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software …”
Volltext
Tagungsbericht -
16
A Frequency optimized architectural approach to lightweight authenticated encryption algorithm ACE-128
Veröffentlicht: IEEE 20.01.2025Veröffentlicht in 2025 Fourth International Conference on Power, Control and Computing Technologies (ICPC2T) (20.01.2025)“… The ACE cipher, a 128-bit lightweight authenticated encryption algorithm, employs a 320-bit …”
Volltext
Tagungsbericht -
17
Hardware-Software Co-Design of the Lightweight Authenticated Encryption Algorithm ASCON for Internet of Things
Veröffentlicht: IEEE 20.12.2024Veröffentlicht in 2024 International Conference on Information Technology, Comunication Ecosystem and Management (ITCEM) (20.12.2024)“… This paper first summarizes the basic principle of ASCON algorithm and its position in NIST lightweight encryption standard, and then introduces the goal and implementation strategy of its software …”
Volltext
Tagungsbericht -
18
The Parallel CMAC Authenticated Encryption Algorithm for Satellite Communication
ISBN: 1728111897, 9781728111896ISSN: 2377-844XVeröffentlicht: IEEE 01.07.2019Veröffentlicht in IEEE International Conference on Electronics Information and Emergency Communication (Online) (01.07.2019)“… The Authenticated Encryption (AE) algorithm provides all these three services. Initially, AE algorithms were proposed with serial architecture …”
Volltext
Tagungsbericht -
19
Tulip: An Authenticated Encryption Algorithm with Trusted Identity
Veröffentlicht: IEEE 10.12.2021Veröffentlicht in 2021 7th International Conference on Computer and Communications (ICCC) (10.12.2021)“… In this paper, the authenticated encryption algorithm (called Tulip) is integratedlydesigned based on the straightforward combination of CFB mode and CBC-MAC mode of blockcipher …”
Volltext
Tagungsbericht -
20
High frequency Area efficient architecture of lightweight authenticated encryption algorithm GIFT-COFB for resource-constrained IOT devices
Veröffentlicht: IEEE 20.01.2025Veröffentlicht in 2025 Fourth International Conference on Power, Control and Computing Technologies (ICPC2T) (20.01.2025)“… Safe and efficient cryptography solutions which may perform in the limitation of resources situations like Internet of Things systems etc is increasingly …”
Volltext
Tagungsbericht

