Search Results - Authenticated encryption algorithm

Refine Results
  1. 1

    Lightweight and flexible hardware implementation of authenticated encryption algorithm SIMON‐Galois/Counter Mode by Cheng, Xin, Xu, Yixuan, Wang, Kefan, Zhang, Yongqiang, Li, Bin, Zhang, Zhang

    ISSN: 0098-9886, 1097-007X
    Published: Bognor Regis Wiley Subscription Services, Inc 01.12.2023
    “…Summary This brief proposes a new lightweight authenticated encryption algorithm SIMON…”
    Get full text
    Journal Article
  2. 2

    Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128 by Salam, Iftekhar, Yau, Wei-Chuen, Phan, Raphaël C.-W., Pieprzyk, Josef

    ISSN: 2190-8508, 2190-8516
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.09.2023
    Published in Journal of cryptographic engineering (01.09.2023)
    “…We investigate a technique that needs to apply multiple random faults to the same target location and compare the impact of these faults on the fault-free and…”
    Get full text
    Journal Article
  3. 3

    Architectural Optimization of Parallel Authenticated Encryption Algorithm for Satellite Application by Pirzada, Syed Jahanzeb Hussain, Murtaza, Abid, Xu, Tongge, Jianwei, Liu

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2020
    Published in IEEE access (2020)
    “… Moreover, the Authenticated Encryption (AE) algorithms provide high-speed communication and security services include data encryption, authentication, and integrity…”
    Get full text
    Journal Article
  4. 4
  5. 5

    Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms by Xu, Yinsong, Liu, Wenjie, Yu, Wenbin

    ISSN: 1570-0755, 1573-1332
    Published: New York Springer US 01.04.2021
    Published in Quantum information processing (01.04.2021)
    “…The classic forgery attacks on COPA, AES-COPA and Marble authenticated encryption algorithms need to query about 2 n / 2 times, and their success probability is not high…”
    Get full text
    Journal Article
  6. 6

    Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant Authenticated Encryption Algorithms by Koteshwara, Sandhya, Das, Amitabh, Parhi, Keshab K.

    ISSN: 1063-8210, 1557-9999
    Published: New York IEEE 01.05.2019
    “…This paper presents a performance comparison of new authenticated encryption (AE) algorithms which are aimed at providing better security and resource efficiency compared to existing standards…”
    Get full text
    Journal Article
  7. 7

    AEUR: authenticated encryption algorithm design based on uBlock round function by Yatao YANG, Hui DONG, Jiantao LIU, Yanshuo ZHANG

    ISSN: 1000-436X
    Published: Editorial Department of Journal on Communications 01.08.2023
    Published in Tongxin Xuebao (01.08.2023)
    “…In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR…”
    Get full text
    Journal Article
  8. 8

    AEUR: authenticated encryption algorithm design based on uBlock round function by Yatao YANG, Hui DONG, Jiantao LIU, Yanshuo ZHANG

    ISSN: 1000-436X
    Published: Editorial Department of Journal on Communications 01.08.2023
    Published in Tongxin Xuebao (01.08.2023)
    “…In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR…”
    Get full text
    Journal Article
  9. 9

    Implementing authenticated encryption algorithm MK-3 on FPGA by Werner, Gordon, Farris, Steven, Kaminsky, Alan, Kurdziel, Michael, Lukowiak, Marcin, Radziszowski, Stanislaw

    ISSN: 2155-7586
    Published: IEEE 01.11.2016
    “…Authenticated encryption (AE) algorithms provide both data security and integrity…”
    Get full text
    Conference Proceeding
  10. 10

    Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm by Bajorski, Peter, Kaminsky, Alan, Kurdziel, Michael, Lukowiak, Marcin, Radziszowski, Stanislaw

    ISSN: 2155-7586
    Published: IEEE 01.10.2018
    “…MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction…”
    Get full text
    Conference Proceeding
  11. 11

    Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition by Zhang, Fan, Liang, Zi-yuan, Yang, Bo-lin, Zhao, Xin-jie, Guo, Shi-ze, Ren, Kui

    ISSN: 2095-9184, 2095-9230
    Published: Hangzhou Zhejiang University Press 01.12.2018
    “…The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR…”
    Get full text
    Journal Article
  12. 12

    Energy-harvesting Q-learning secure routing algorithm with authenticated-encryption for WSN by Li, Cuiran, Wu, Jixuan, Zhang, Zepeng, Lv, Anqi

    ISSN: 2405-9595, 2405-9595
    Published: Elsevier 01.12.2023
    Published in ICT express (01.12.2023)
    “… To address these issues, we innovatively propose an energy-harvesting Q-learning secure routing algorithm with authenticated-encryption…”
    Get full text
    Journal Article
  13. 13

    Ascon v1.2: Lightweight Authenticated Encryption and Hashing by Dobraunig, Christoph, Eichlseder, Maria, Mendel, Florian, Schläffer, Martin

    ISSN: 0933-2790, 1432-1378
    Published: New York Springer US 01.07.2021
    Published in Journal of cryptology (01.07.2021)
    “… In this paper, we provide the specification of Ascon -128 and Ascon -128a. Both authenticated encryption algorithms provide efficient authenticated encryption on resource-constrained devices and on high-end CPUs…”
    Get full text
    Journal Article
  14. 14

    Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN by Lara-Nino, Carlos Andres, Morales-Sandoval, Miguel, Diaz-Perez, Arturo

    ISSN: 1939-0114, 1939-0122, 1939-0122
    Published: Cairo, Egypt Hindawi Publishing Corporation 01.01.2018
    Published in Security and communication networks (01.01.2018)
    “… Authenticated encryption is a mechanism to provide these systems with confidentiality, integrity, and authentication of sensitive data…”
    Get full text
    Journal Article
  15. 15

    Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm by Fabinski, Peter, Farris, Steve, Kurdziel, Michael, Lukowiak, Marcin, Radziszowski, Stanislaw

    Published: Lodz University of Technology 29.06.2023
    “…MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software…”
    Get full text
    Conference Proceeding
  16. 16
  17. 17

    Hardware-Software Co-Design of the Lightweight Authenticated Encryption Algorithm ASCON for Internet of Things by Wu, Yunqiang

    Published: IEEE 20.12.2024
    “… This paper first summarizes the basic principle of ASCON algorithm and its position in NIST lightweight encryption standard, and then introduces the goal and implementation strategy of its software…”
    Get full text
    Conference Proceeding
  18. 18

    The Parallel CMAC Authenticated Encryption Algorithm for Satellite Communication by Hussain Pirzada, Syed Jahanzeb, Murtaza, Abid, Jianwei, Liu, Xu, Tongge

    ISBN: 1728111897, 9781728111896
    ISSN: 2377-844X
    Published: IEEE 01.07.2019
    “… The Authenticated Encryption (AE) algorithm provides all these three services. Initially, AE algorithms were proposed with serial architecture…”
    Get full text
    Conference Proceeding
  19. 19

    Tulip: An Authenticated Encryption Algorithm with Trusted Identity by Zhang, Lan, Yu, Bin, He, Liangsheng

    Published: IEEE 10.12.2021
    “…In this paper, the authenticated encryption algorithm (called Tulip) is integratedlydesigned based on the straightforward combination of CFB mode and CBC-MAC mode of blockcipher…”
    Get full text
    Conference Proceeding
  20. 20

    High frequency Area efficient architecture of lightweight authenticated encryption algorithm GIFT-COFB for resource-constrained IOT devices by Choubey, PankajKu, Patnaik, Bijayananda, Acharya, Bibhudendra

    Published: IEEE 20.01.2025
    “…Safe and efficient cryptography solutions which may perform in the limitation of resources situations like Internet of Things systems etc is increasingly…”
    Get full text
    Conference Proceeding