Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
Sancus 2.0: A low-cost security architecture for iot devices
The Sancus security architecture for networked embedded devices was proposed in 2013 at
the USENIX Security conference. It supports remote (even third-party) software installation …
the USENIX Security conference. It supports remote (even third-party) software installation …
How to securely release unverified plaintext in authenticated encryption
Scenarios in which authenticated encryption schemes output decrypted plaintext before
successful verification raise many security issues. These situations are sometimes …
successful verification raise many security issues. These situations are sometimes …
Improved masking for tweakable blockciphers with applications to authenticated encryption
A popular approach to tweakable blockcipher design is via masking, where a certain
primitive (a blockcipher or a permutation) is preceded and followed by an easy-to-compute …
primitive (a blockcipher or a permutation) is preceded and followed by an easy-to-compute …
Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes
The Sponge function is known to achieve 2 c/2 security, where c is its capacity. This bound
was carried over to keyed variants of the function, such as SpongeWrap, to achieve a min {2 …
was carried over to keyed variants of the function, such as SpongeWrap, to achieve a min {2 …
Statistical fault attacks on nonce-based authenticated encryption schemes
Since the first demonstration of fault attacks by Boneh et al. on RSA, a multitude of fault
attack techniques on various cryptosystems have been proposed. Most of these techniques …
attack techniques on various cryptosystems have been proposed. Most of these techniques …
Online authenticated-encryption and its nonce-reuse misuse-resistance
A definition of online authenticated-encryption (OAE), call it OAE1, was given by
Fleischmann, Forler, and Lucks (2012). It has become a popular definitional target because …
Fleischmann, Forler, and Lucks (2012). It has become a popular definitional target because …
Sponge-based control-flow protection for IoT devices
Embedded devices in the Internet of Things (IoT) face a wide variety of security challenges.
For example, software attackers perform code injection and code-reuse attacks on their …
For example, software attackers perform code injection and code-reuse attacks on their …
[PDF][PDF] Low AND depth and efficient inverses: a guide on s-boxes for low-latency masking
In this work, we perform an extensive investigation and construct a portfolio of S-boxes
suitable for secure lightweight implementations, which aligns well with the ongoing NIST …
suitable for secure lightweight implementations, which aligns well with the ongoing NIST …
Leakage resilience of the duplex construction
Side-channel attacks, especially differential power analysis (DPA), pose a serious threat to
cryptographic implementations deployed in a malicious environment. One way to counter …
cryptographic implementations deployed in a malicious environment. One way to counter …