Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our
information infrastructure. In this paper, we provide the specification of Ascon-128 and …
information infrastructure. In this paper, we provide the specification of Ascon-128 and …
Xoodyak, a lightweight cryptographic scheme
In this paper, we present Xoodyak, a cryptographic primitive that can be used for hashing,
encryption, MAC computation and authenticated encryption. Essentially, it is a duplex object …
encryption, MAC computation and authenticated encryption. Essentially, it is a duplex object …
Mode-level vs. implementation-level physical security in symmetric cryptography: A practical guide through the leakage-resistance jungle
Triggered by the increasing deployment of embedded cryptographic devices (eg, for the
IoT), the design of authentication, encryption and authenticated encryption schemes …
IoT), the design of authentication, encryption and authenticated encryption schemes …
Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher
This paper defines Spook: a sponge-based authenticated encryption with associated data
algorithm. It is primarily designed to provide security against side-channel attacks at a low …
algorithm. It is primarily designed to provide security against side-channel attacks at a low …
Farfalle: parallel permutation-based cryptography
In this paper, we introduce Farfalle, a new permutation-based construction for building a
pseudorandom function (PRF). The PRF takes as input a key and a sequence of arbitrary …
pseudorandom function (PRF). The PRF takes as input a key and a sequence of arbitrary …
Misuse-free key-recovery and distinguishing attacks on 7-round Ascon
Being one of the winning algorithms of the CAESAR competition and currently a second
round candidate of the NIST lightweight cryptography standardization project, the …
round candidate of the NIST lightweight cryptography standardization project, the …
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection
In this work we present a duplex-based authenticated encryption scheme Friet based on a
new permutation called Friet-P. We designed Friet-P with a novel approach for cryptographic …
new permutation called Friet-P. We designed Friet-P with a novel approach for cryptographic …
Leakage resilience of the duplex construction
Side-channel attacks, especially differential power analysis (DPA), pose a serious threat to
cryptographic implementations deployed in a malicious environment. One way to counter …
cryptographic implementations deployed in a malicious environment. One way to counter …
[PDF][PDF] Dumbo, jumbo, and delirium: Parallel authenticated encryption for the lightweight circus
With the trend to connect more and more devices to the Internet, authenticated encryption
has become a major backbone in securing the communication, not only between these …
has become a major backbone in securing the communication, not only between these …
SAEB: A lightweight blockcipher-based AEAD mode of operation
Lightweight cryptography in computationally constrained devices is actively studied. In
contrast to advances of lightweight blockcipher in the last decade, lightweight mode of …
contrast to advances of lightweight blockcipher in the last decade, lightweight mode of …