Suchergebnisse - Authenticated encryption algorithm

  1. 1

    Lightweight and flexible hardware implementation of authenticated encryption algorithm SIMON‐Galois/Counter Mode von Cheng, Xin, Xu, Yixuan, Wang, Kefan, Zhang, Yongqiang, Li, Bin, Zhang, Zhang

    ISSN: 0098-9886, 1097-007X
    Veröffentlicht: Bognor Regis Wiley Subscription Services, Inc 01.12.2023
    “… Summary This brief proposes a new lightweight authenticated encryption algorithm SIMON …”
    Volltext
    Journal Article
  2. 2

    AEUR: authenticated encryption algorithm design based on uBlock round function von Yatao YANG, Hui DONG, Jiantao LIU, Yanshuo ZHANG

    ISSN: 1000-436X
    Veröffentlicht: Editorial Department of Journal on Communications 01.08.2023
    Veröffentlicht in Tongxin Xuebao (01.08.2023)
    “… In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR …”
    Volltext
    Journal Article
  3. 3

    AEUR: authenticated encryption algorithm design based on uBlock round function von Yatao YANG, Hui DONG, Jiantao LIU, Yanshuo ZHANG

    ISSN: 1000-436X
    Veröffentlicht: Editorial Department of Journal on Communications 01.08.2023
    Veröffentlicht in Tongxin Xuebao (01.08.2023)
    “… In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR …”
    Volltext
    Journal Article
  4. 4

    Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128 von Salam, Iftekhar, Yau, Wei-Chuen, Phan, Raphaël C.-W., Pieprzyk, Josef

    ISSN: 2190-8508, 2190-8516
    Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.09.2023
    Veröffentlicht in Journal of cryptographic engineering (01.09.2023)
    “… We investigate a technique that needs to apply multiple random faults to the same target location and compare the impact of these faults on the fault-free and …”
    Volltext
    Journal Article
  5. 5

    Architectural Optimization of Parallel Authenticated Encryption Algorithm for Satellite Application von Pirzada, Syed Jahanzeb Hussain, Murtaza, Abid, Xu, Tongge, Jianwei, Liu

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2020
    Veröffentlicht in IEEE access (2020)
    “… Moreover, the Authenticated Encryption (AE) algorithms provide high-speed communication and security services include data encryption, authentication, and integrity …”
    Volltext
    Journal Article
  6. 6
  7. 7

    Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms von Xu, Yinsong, Liu, Wenjie, Yu, Wenbin

    ISSN: 1570-0755, 1573-1332
    Veröffentlicht: New York Springer US 01.04.2021
    Veröffentlicht in Quantum information processing (01.04.2021)
    “… The classic forgery attacks on COPA, AES-COPA and Marble authenticated encryption algorithms need to query about 2 n / 2 times, and their success probability is not high …”
    Volltext
    Journal Article
  8. 8

    Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant Authenticated Encryption Algorithms von Koteshwara, Sandhya, Das, Amitabh, Parhi, Keshab K.

    ISSN: 1063-8210, 1557-9999
    Veröffentlicht: New York IEEE 01.05.2019
    “… This paper presents a performance comparison of new authenticated encryption (AE) algorithms which are aimed at providing better security and resource efficiency compared to existing standards …”
    Volltext
    Journal Article
  9. 9

    Implementing authenticated encryption algorithm MK-3 on FPGA von Werner, Gordon, Farris, Steven, Kaminsky, Alan, Kurdziel, Michael, Lukowiak, Marcin, Radziszowski, Stanislaw

    ISSN: 2155-7586
    Veröffentlicht: IEEE 01.11.2016
    Veröffentlicht in MILCOM IEEE Military Communications Conference (01.11.2016)
    “… Authenticated encryption (AE) algorithms provide both data security and integrity …”
    Volltext
    Tagungsbericht
  10. 10

    Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm von Bajorski, Peter, Kaminsky, Alan, Kurdziel, Michael, Lukowiak, Marcin, Radziszowski, Stanislaw

    ISSN: 2155-7586
    Veröffentlicht: IEEE 01.10.2018
    “… MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction …”
    Volltext
    Tagungsbericht
  11. 11

    Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition von Zhang, Fan, Liang, Zi-yuan, Yang, Bo-lin, Zhao, Xin-jie, Guo, Shi-ze, Ren, Kui

    ISSN: 2095-9184, 2095-9230
    Veröffentlicht: Hangzhou Zhejiang University Press 01.12.2018
    “… The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR …”
    Volltext
    Journal Article
  12. 12

    Energy-harvesting Q-learning secure routing algorithm with authenticated-encryption for WSN von Li, Cuiran, Wu, Jixuan, Zhang, Zepeng, Lv, Anqi

    ISSN: 2405-9595, 2405-9595
    Veröffentlicht: Elsevier 01.12.2023
    Veröffentlicht in ICT express (01.12.2023)
    “… To address these issues, we innovatively propose an energy-harvesting Q-learning secure routing algorithm with authenticated-encryption …”
    Volltext
    Journal Article
  13. 13

    Ascon v1.2: Lightweight Authenticated Encryption and Hashing von Dobraunig, Christoph, Eichlseder, Maria, Mendel, Florian, Schläffer, Martin

    ISSN: 0933-2790, 1432-1378
    Veröffentlicht: New York Springer US 01.07.2021
    Veröffentlicht in Journal of cryptology (01.07.2021)
    “… In this paper, we provide the specification of Ascon -128 and Ascon -128a. Both authenticated encryption algorithms provide efficient authenticated encryption on resource-constrained devices and on high-end CPUs …”
    Volltext
    Journal Article
  14. 14

    Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN von Lara-Nino, Carlos Andres, Morales-Sandoval, Miguel, Diaz-Perez, Arturo

    ISSN: 1939-0114, 1939-0122, 1939-0122
    Veröffentlicht: Cairo, Egypt Hindawi Publishing Corporation 01.01.2018
    Veröffentlicht in Security and communication networks (01.01.2018)
    “… Authenticated encryption is a mechanism to provide these systems with confidentiality, integrity, and authentication of sensitive data …”
    Volltext
    Journal Article
  15. 15

    Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm von Fabinski, Peter, Farris, Steve, Kurdziel, Michael, Lukowiak, Marcin, Radziszowski, Stanislaw

    Veröffentlicht: Lodz University of Technology 29.06.2023
    “… MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software …”
    Volltext
    Tagungsbericht
  16. 16

    A Frequency optimized architectural approach to lightweight authenticated encryption algorithm ACE-128 von Srikanth, Medaboyina, Patnaik, Bijayananda, Acharya, Bibhudendra

    Veröffentlicht: IEEE 20.01.2025
    “… The ACE cipher, a 128-bit lightweight authenticated encryption algorithm, employs a 320-bit …”
    Volltext
    Tagungsbericht
  17. 17

    Hardware-Software Co-Design of the Lightweight Authenticated Encryption Algorithm ASCON for Internet of Things von Wu, Yunqiang

    Veröffentlicht: IEEE 20.12.2024
    “… This paper first summarizes the basic principle of ASCON algorithm and its position in NIST lightweight encryption standard, and then introduces the goal and implementation strategy of its software …”
    Volltext
    Tagungsbericht
  18. 18

    The Parallel CMAC Authenticated Encryption Algorithm for Satellite Communication von Hussain Pirzada, Syed Jahanzeb, Murtaza, Abid, Jianwei, Liu, Xu, Tongge

    ISBN: 1728111897, 9781728111896
    ISSN: 2377-844X
    Veröffentlicht: IEEE 01.07.2019
    “… The Authenticated Encryption (AE) algorithm provides all these three services. Initially, AE algorithms were proposed with serial architecture …”
    Volltext
    Tagungsbericht
  19. 19

    Tulip: An Authenticated Encryption Algorithm with Trusted Identity von Zhang, Lan, Yu, Bin, He, Liangsheng

    Veröffentlicht: IEEE 10.12.2021
    “… In this paper, the authenticated encryption algorithm (called Tulip) is integratedlydesigned based on the straightforward combination of CFB mode and CBC-MAC mode of blockcipher …”
    Volltext
    Tagungsbericht
  20. 20

    High frequency Area efficient architecture of lightweight authenticated encryption algorithm GIFT-COFB for resource-constrained IOT devices von Choubey, PankajKu, Patnaik, Bijayananda, Acharya, Bibhudendra

    Veröffentlicht: IEEE 20.01.2025
    “… Safe and efficient cryptography solutions which may perform in the limitation of resources situations like Internet of Things systems etc is increasingly …”
    Volltext
    Tagungsbericht