Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022‏ - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

One hot garbling

D Heath, V Kolesnikov - Proceedings of the 2021 ACM SIGSAC …, 2021‏ - dl.acm.org
Garbled Circuit (GC) is the main practical 2PC technique, yet despite great interest in its
performance, GC notoriously resists improvement. Essentially, we only know how to …

Small low-depth circuits for cryptographic applications

J Boyar, MG Find, R Peralta - Cryptography and Communications, 2019‏ - Springer
We present techniques to obtain small circuits which also have low depth. The techniques
apply to typical cryptographic functions, as these are often specified over the field GF (2) …

BoolSPLG: A library with parallel algorithms for Boolean functions and S-boxes for GPU

D Bikov, I Bouyukliev, M Dzhumalieva-Stoeva - Mathematics, 2023‏ - mdpi.com
In this paper, we present a library with sequential and parallel functions for computing some
of the most important cryptographic characteristics of Boolean and vectorial Boolean …

Implementing authenticated encryption algorithm MK-3 on FPGA

G Werner, S Farris, A Kaminsky… - MILCOM 2016-2016 …, 2016‏ - ieeexplore.ieee.org
Authenticated encryption (AE) algorithms provide both data security and integrity. While a
number of AE algorithms exist, they can be inefficient and difficult to use. Recent efforts have …

A circuit area optimization of MK-3 S-box

Y Li, W Zhang, Y Lin, J Zou, J Liu - Cybersecurity, 2024‏ - Springer
In MILCOM 2015, Kelly et al. proposed the authentication encryption algorithm MK-3, which
applied the 16-bit S-box. This paper aims to implement the 16-bit S-box with less circuit …

Customization modes for the Harris MK-3 authenticated encryption algorithm

P Bajorski, A Kaminsky, M Kurdziel… - MILCOM 2018-2018 …, 2018‏ - ieeexplore.ieee.org
MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge
construction. To provide security autonomy capability, such that different users can have …

Efficiency of logic minimization techniques for cryptographic hardware implementation

S Raghuraman - 2019‏ - vtechworks.lib.vt.edu
With significant research effort being directed towards designing lightweight cryptographic
primitives, logical metrics such as gate count are extensively used in estimating their …

[كتاب][B] Evaluating performance and efficiency of a 16-bit substitution box on an FPGA

DF Stafford - 2021‏ - search.proquest.com
Abstract A Substitution Box (S-Box) is an integral component of modern block ciphers that
provides confusion. The term" confusion" was introduced by Shannon in 1949 and it refers to …

Hardware Obfuscation of the 16-bit S-box in the MK-3 Cipher

J Blocklove, S Farris, M Kurdziel… - … on Mixed Design of …, 2021‏ - ieeexplore.ieee.org
At different stages of the Integrated Circuit (IC) lifecycle there are attacks which threaten to
compromise the integrity of the design through piracy, reverse engineering, hardware Trojan …