Search Results - "Authenticated encryption algorithm"
-
1
Lightweight and flexible hardware implementation of authenticated encryption algorithm SIMON‐Galois/Counter Mode
ISSN: 0098-9886, 1097-007XPublished: Bognor Regis Wiley Subscription Services, Inc 01.12.2023Published in International journal of circuit theory and applications (01.12.2023)“…Summary This brief proposes a new lightweight authenticated encryption algorithm SIMON…”
Get full text
Journal Article -
2
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128
ISSN: 2190-8508, 2190-8516Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.09.2023Published in Journal of cryptographic engineering (01.09.2023)“…We investigate a technique that needs to apply multiple random faults to the same target location and compare the impact of these faults on the fault-free and…”
Get full text
Journal Article -
3
Architectural Optimization of Parallel Authenticated Encryption Algorithm for Satellite Application
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2020Published in IEEE access (2020)“…High-speed data communication is becoming essential for many applications, including satellite communication. The security algorithms associated with the…”
Get full text
Journal Article -
4
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM
ISSN: 2214-2126Published: 01.11.2022Published in Journal of information security and applications (01.11.2022)Get full text
Journal Article -
5
Implementing authenticated encryption algorithm MK-3 on FPGA
ISSN: 2155-7586Published: IEEE 01.11.2016Published in MILCOM IEEE Military Communications Conference (01.11.2016)“…Authenticated encryption (AE) algorithms provide both data security and integrity. While a number of AE algorithms exist, they can be inefficient and difficult…”
Get full text
Conference Proceeding -
6
Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm
ISSN: 2155-7586Published: IEEE 01.10.2018Published in MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM) (01.10.2018)“…MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction…”
Get full text
Conference Proceeding -
7
AEUR: authenticated encryption algorithm design based on uBlock round function
ISSN: 1000-436XPublished: Editorial Department of Journal on Communications 01.08.2023Published in Tongxin Xuebao (01.08.2023)“…In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR…”
Get full text
Journal Article -
8
AEUR: authenticated encryption algorithm design based on uBlock round function
ISSN: 1000-436XPublished: Editorial Department of Journal on Communications 01.08.2023Published in Tongxin Xuebao (01.08.2023)“…In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR…”
Get full text
Journal Article -
9
Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm
Published: Lodz University of Technology 29.06.2023Published in 2023 30th International Conference on Mixed Design of Integrated Circuits and System (MIXDES) (29.06.2023)“…MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software. It provides broad factory and…”
Get full text
Conference Proceeding -
10
A Frequency optimized architectural approach to lightweight authenticated encryption algorithm ACE-128
Published: IEEE 20.01.2025Published in 2025 Fourth International Conference on Power, Control and Computing Technologies (ICPC2T) (20.01.2025)“… The ACE cipher, a 128-bit lightweight authenticated encryption algorithm, employs a 320-bit…”
Get full text
Conference Proceeding -
11
Hardware-Software Co-Design of the Lightweight Authenticated Encryption Algorithm ASCON for Internet of Things
Published: IEEE 20.12.2024Published in 2024 International Conference on Information Technology, Comunication Ecosystem and Management (ITCEM) (20.12.2024)“…With the rapid development of Internet of Things (IoT) technology, the popularity of smart devices poses new challenges to data security. ASCON algorithm is an…”
Get full text
Conference Proceeding -
12
Tulip: An Authenticated Encryption Algorithm with Trusted Identity
Published: IEEE 10.12.2021Published in 2021 7th International Conference on Computer and Communications (ICCC) (10.12.2021)“…In this paper, the authenticated encryption algorithm (called Tulip) is integratedlydesigned based on the straightforward combination of CFB mode and CBC-MAC mode of blockcipher…”
Get full text
Conference Proceeding -
13
High frequency Area efficient architecture of lightweight authenticated encryption algorithm GIFT-COFB for resource-constrained IOT devices
Published: IEEE 20.01.2025Published in 2025 Fourth International Conference on Power, Control and Computing Technologies (ICPC2T) (20.01.2025)“…Safe and efficient cryptography solutions which may perform in the limitation of resources situations like Internet of Things systems etc is increasingly…”
Get full text
Conference Proceeding -
14
The Parallel CMAC Authenticated Encryption Algorithm for Satellite Communication
ISBN: 1728111897, 9781728111896ISSN: 2377-844XPublished: IEEE 01.07.2019Published in IEEE International Conference on Electronics Information and Emergency Communication (Online) (01.07.2019)“…The evolution in digital communication technology has provoked the need for providing efficient security services for communication. The data security services…”
Get full text
Conference Proceeding -
15
Deoxyribonucleic Acid Based Nonce-Misuse-Resistant Authenticated Encryption Algorithm
ISSN: 2767-9934Published: IEEE 24.09.2021Published in International Conference on Electronics, Materials Engineering and Nano-Technology (Online) (24.09.2021)“…This paper aims to present a performance comparison of new authenticated encryption (AE) algorithm with the objective of high network security and better…”
Get full text
Conference Proceeding -
16
The Implementation of AES-CMAC Authenticated Encryption Algorithm on FPGA
Published: IEEE 01.08.2019Published in 2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET) (01.08.2019)“…The advancements in communication technology have evolved the algorithms used for communication security. Recently, the Authenticated Encryption (AE)…”
Get full text
Conference Proceeding -
17
A New Cube Attack on MORUS by Using Division Property
ISSN: 0018-9340, 1557-9956Published: New York IEEE 01.12.2019Published in IEEE transactions on computers (01.12.2019)“…MORUS is an authenticated encryption algorithm and one of the candidates in the CAESAR competition…”
Get full text
Journal Article -
18
Low-Memory Implementation of Authenticated Encryption Algorithm SAEAES on ARM Cortex-M0 Microcontroller
Published: IEEE 13.10.2020Published in 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE) (13.10.2020)“…SAEAES is a lightweight authenticated encryption algorithm and is a candidate of the NIST's competition for choosing a new standard…”
Get full text
Conference Proceeding -
19
Research and design of authenticated encryption algorithm based on AES round function
ISSN: 2096-109XPublished: POSTS&TELECOM PRESS Co., LTD 01.04.2020Published in 网络与信息安全学报 (01.04.2020)“…The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time, and has extensive research and application prospects in the field of information security…”
Get full text
Journal Article -
20
Research and design of authenticated encryption algorithm based on AES round function
ISSN: 2096-109XPublished: POSTS&TELECOM PRESS Co., LTD 01.04.2020Published in 网络与信息安全学报 (01.04.2020)“…The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information…”
Get full text
Journal Article

