Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

Comparative performance analysis of lightweight cryptography algorithms for IoT sensor nodes

A Fotovvat, GME Rahman, SS Vedaei… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) has become an integral part of future solutions, ranging from
industrial to everyday human life applications. Adding a new level of intelligence to objects …

SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations

S Chen, Y Fan, L Sun, Y Fu, H Zhou, Y Li… - Designs, Codes and …, 2022 - Springer
We revisit designing AND-RX block ciphers, that is, the designs assembled with the most
fundamental binary operations—AND, Rotation and XOR operations and do not rely on …

Key guessing strategies for linear key-schedule algorithms in rectangle attacks

X Dong, L Qin, S Sun, X Wang - … on the Theory and Applications of …, 2022 - Springer
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we
find the right quartets which may suggest key candidates have to satisfy some nonlinear …

Improved rectangle attacks on SKINNY and CRAFT

H Hadipour, N Bagheri, L Song - IACR Transactions on Symmetric …, 2021 - tches.iacr.org
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard
the target cipher E as a composition of two sub-ciphers, ie, E= E1∘ E0, to construct a …

An authentication protocol for next generation of constrained Iot systems

S Rostampour, N Bagheri, Y Bendavid… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
With the exponential growth of connected Internet of Things (IoT) devices around the world,
security protection and privacy preservation have risen to the forefront of design and …

Automated search oriented to key recovery on ciphers with linear key schedule: applications to boomerangs in SKINNY and ForkSkinny

L Qin, X Dong, X Wang, K Jia, Y Liu - IACR Transactions on Symmetric …, 2021 - tosc.iacr.org
Automatic modelling to search distinguishers with high probability covering as many rounds
as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis …

1, 2, 3, fork: Counter mode variants based on a generalized forkcipher

E Andreeva, AS Bhati, B Preneel, D Vizár - Cryptology ePrint Archive, 2021 - eprint.iacr.org
A multi-forkcipher (MFC) is a generalization of the forkcipher (FC) primitive introduced by
Andreeva et al. at ASIACRYPT'19. An MFC is a tweakable cipher that computes $ s $ output …

Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation

AS Bhati, E Pohle, A Abidin, E Andreeva… - Proceedings of the 2023 …, 2023 - dl.acm.org
IoT devices collect privacy-sensitive data, eg, in smart grids or in medical devices, and send
this data to cloud servers for further processing. In order to ensure confidentiality as well as …

Energy analysis of lightweight AEAD circuits

A Caforio, F Balli, S Banik - … , CANS 2020, Vienna, Austria, December 14 …, 2020 - Springer
The selection criteria for NIST's Lightweight Crypto Standardization (LWC) have been slowly
shifting towards the lightweight efficiency of designs, given that a large number of …