Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, C Calik… - 2021 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …

Mode-level vs. implementation-level physical security in symmetric cryptography: A practical guide through the leakage-resistance jungle

D Bellizia, O Bronchain, G Cassiers, V Grosso… - Advances in Cryptology …, 2020 - Springer
Triggered by the increasing deployment of embedded cryptographic devices (eg, for the
IoT), the design of authentication, encryption and authenticated encryption schemes …

Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter

O Bronchain, FX Standaert - IACR Transactions on Cryptographic …, 2021 - tches.iacr.org
We explore the concrete side-channel security provided by state-of-theart higher-order
masked software implementations of the AES and the (candidate to the NIST Lightweight …

FPGA benchmarking of round 2 candidates in the NIST lightweight cryptography standardization process: Methodology, metrics, tools, and results

K Mohajerani, R Haeussler, R Nagpal… - Cryptology ePrint …, 2020 - eprint.iacr.org
Twenty seven Round 2 candidates in the NIST Lightweight Cryptography (LWC) process
have been implemented in hardware by groups from all over the world. All implementations …

Estranet: An efficient shift-invariant transformer network for side-channel analysis

S Hajra, S Chowdhury… - IACR Transactions on …, 2024 - tches.iacr.org
Deep Learning (DL) based Side-Channel Analysis (SCA) has been extremely popular
recently. DL-based SCA can easily break implementations protected by masking …

Construction of robust lightweight s-boxes using enhanced logistic and enhanced sine maps

PP Duong, HM Nguyen, BA Dao… - IEEE …, 2024 - ieeexplore.ieee.org
Substitution boxes (S-Boxes) are essential elements of modern block ciphers, serving as
non-linear characteristics that enhance the resistance of these ciphers against cryptanalysis …

Scalable and efficient hardware architectures for authenticated encryption in IoT applications

S Khan, WK Lee, SO Hwang - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is a key enabling technology, wherein sensors are placed
ubiquitously to collect and exchange information with their surrounding nodes. Due to the …

Triplex: an efficient and one-pass leakage-resistant mode of operation

Y Shen, T Peters, FX Standaert, G Cassiers… - IACR Transactions on …, 2022 - bmt.ub.rub.de
This paper introduces and analyzes Triplex, a leakage-resistant mode of operation based on
Tweakable Block Ciphers (TBCs) with 2n-bit tweaks. Triplex enjoys beyond-birthday …

Efficient regression-based linear discriminant analysis for side-channel security evaluations: Towards analytical attacks against 32-bit implementations

G Cassiers, H Devillez… - IACR Transactions …, 2023 - ojs.ub.ruhr-uni-bochum.de
32-bit software implementations become increasingly popular for embedded security
applications. As a result, profiling 32-bit target intermediate values becomes increasingly …