Search Results - "Authenticated encryption algorithm"

Refine Results
  1. 1

    Lightweight and flexible hardware implementation of authenticated encryption algorithm SIMON‐Galois/Counter Mode by Cheng, Xin, Xu, Yixuan, Wang, Kefan, Zhang, Yongqiang, Li, Bin, Zhang, Zhang

    ISSN: 0098-9886, 1097-007X
    Published: Bognor Regis Wiley Subscription Services, Inc 01.12.2023
    “…Summary This brief proposes a new lightweight authenticated encryption algorithm SIMON…”
    Get full text
    Journal Article
  2. 2

    Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128 by Salam, Iftekhar, Yau, Wei-Chuen, Phan, Raphaël C.-W., Pieprzyk, Josef

    ISSN: 2190-8508, 2190-8516
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.09.2023
    Published in Journal of cryptographic engineering (01.09.2023)
    “…We investigate a technique that needs to apply multiple random faults to the same target location and compare the impact of these faults on the fault-free and…”
    Get full text
    Journal Article
  3. 3

    Architectural Optimization of Parallel Authenticated Encryption Algorithm for Satellite Application by Pirzada, Syed Jahanzeb Hussain, Murtaza, Abid, Xu, Tongge, Jianwei, Liu

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2020
    Published in IEEE access (2020)
    “…High-speed data communication is becoming essential for many applications, including satellite communication. The security algorithms associated with the…”
    Get full text
    Journal Article
  4. 4
  5. 5

    Implementing authenticated encryption algorithm MK-3 on FPGA by Werner, Gordon, Farris, Steven, Kaminsky, Alan, Kurdziel, Michael, Lukowiak, Marcin, Radziszowski, Stanislaw

    ISSN: 2155-7586
    Published: IEEE 01.11.2016
    “…Authenticated encryption (AE) algorithms provide both data security and integrity. While a number of AE algorithms exist, they can be inefficient and difficult…”
    Get full text
    Conference Proceeding
  6. 6

    Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm by Bajorski, Peter, Kaminsky, Alan, Kurdziel, Michael, Lukowiak, Marcin, Radziszowski, Stanislaw

    ISSN: 2155-7586
    Published: IEEE 01.10.2018
    “…MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction…”
    Get full text
    Conference Proceeding
  7. 7

    AEUR: authenticated encryption algorithm design based on uBlock round function by Yatao YANG, Hui DONG, Jiantao LIU, Yanshuo ZHANG

    ISSN: 1000-436X
    Published: Editorial Department of Journal on Communications 01.08.2023
    Published in Tongxin Xuebao (01.08.2023)
    “…In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR…”
    Get full text
    Journal Article
  8. 8

    AEUR: authenticated encryption algorithm design based on uBlock round function by Yatao YANG, Hui DONG, Jiantao LIU, Yanshuo ZHANG

    ISSN: 1000-436X
    Published: Editorial Department of Journal on Communications 01.08.2023
    Published in Tongxin Xuebao (01.08.2023)
    “…In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR…”
    Get full text
    Journal Article
  9. 9

    Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm by Fabinski, Peter, Farris, Steve, Kurdziel, Michael, Lukowiak, Marcin, Radziszowski, Stanislaw

    Published: Lodz University of Technology 29.06.2023
    “…MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software. It provides broad factory and…”
    Get full text
    Conference Proceeding
  10. 10
  11. 11

    Hardware-Software Co-Design of the Lightweight Authenticated Encryption Algorithm ASCON for Internet of Things by Wu, Yunqiang

    Published: IEEE 20.12.2024
    “…With the rapid development of Internet of Things (IoT) technology, the popularity of smart devices poses new challenges to data security. ASCON algorithm is an…”
    Get full text
    Conference Proceeding
  12. 12

    Tulip: An Authenticated Encryption Algorithm with Trusted Identity by Zhang, Lan, Yu, Bin, He, Liangsheng

    Published: IEEE 10.12.2021
    “…In this paper, the authenticated encryption algorithm (called Tulip) is integratedlydesigned based on the straightforward combination of CFB mode and CBC-MAC mode of blockcipher…”
    Get full text
    Conference Proceeding
  13. 13

    High frequency Area efficient architecture of lightweight authenticated encryption algorithm GIFT-COFB for resource-constrained IOT devices by Choubey, PankajKu, Patnaik, Bijayananda, Acharya, Bibhudendra

    Published: IEEE 20.01.2025
    “…Safe and efficient cryptography solutions which may perform in the limitation of resources situations like Internet of Things systems etc is increasingly…”
    Get full text
    Conference Proceeding
  14. 14

    The Parallel CMAC Authenticated Encryption Algorithm for Satellite Communication by Hussain Pirzada, Syed Jahanzeb, Murtaza, Abid, Jianwei, Liu, Xu, Tongge

    ISBN: 1728111897, 9781728111896
    ISSN: 2377-844X
    Published: IEEE 01.07.2019
    “…The evolution in digital communication technology has provoked the need for providing efficient security services for communication. The data security services…”
    Get full text
    Conference Proceeding
  15. 15

    Deoxyribonucleic Acid Based Nonce-Misuse-Resistant Authenticated Encryption Algorithm by Akumalla, Harichandana, Hegde, Ganapathi

    ISSN: 2767-9934
    Published: IEEE 24.09.2021
    “…This paper aims to present a performance comparison of new authenticated encryption (AE) algorithm with the objective of high network security and better…”
    Get full text
    Conference Proceeding
  16. 16

    The Implementation of AES-CMAC Authenticated Encryption Algorithm on FPGA by Hussain Pirzada, Syed Jahanzeb, Murtaza, Abid, Hasan, Muhammad Noman, Xu, Tongge, Jianwei, Liu

    Published: IEEE 01.08.2019
    “…The advancements in communication technology have evolved the algorithms used for communication security. Recently, the Authenticated Encryption (AE)…”
    Get full text
    Conference Proceeding
  17. 17

    A New Cube Attack on MORUS by Using Division Property by Ye, Tao, Wei, Yongzhuang, Meier, Willi

    ISSN: 0018-9340, 1557-9956
    Published: New York IEEE 01.12.2019
    Published in IEEE transactions on computers (01.12.2019)
    “…MORUS is an authenticated encryption algorithm and one of the candidates in the CAESAR competition…”
    Get full text
    Journal Article
  18. 18

    Low-Memory Implementation of Authenticated Encryption Algorithm SAEAES on ARM Cortex-M0 Microcontroller by Yabu, Marika, Sakiyama, Kazuo, Sugawara, Takeshi

    Published: IEEE 13.10.2020
    “…SAEAES is a lightweight authenticated encryption algorithm and is a candidate of the NIST's competition for choosing a new standard…”
    Get full text
    Conference Proceeding
  19. 19

    Research and design of authenticated encryption algorithm based on AES round function by GAO Guoqiang, LI Zichen

    ISSN: 2096-109X
    Published: POSTS&TELECOM PRESS Co., LTD 01.04.2020
    Published in 网络与信息安全学报 (01.04.2020)
    “…The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time, and has extensive research and application prospects in the field of information security…”
    Get full text
    Journal Article
  20. 20

    Research and design of authenticated encryption algorithm based on AES round function by Guoqiang GAO, Zichen LI

    ISSN: 2096-109X
    Published: POSTS&TELECOM PRESS Co., LTD 01.04.2020
    Published in 网络与信息安全学报 (01.04.2020)
    “…The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information…”
    Get full text
    Journal Article