Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

A survey on cryptographic techniques for protecting big data security: present and forthcoming

S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …

The Deoxys AEAD Family

J Jean, I Nikolić, T Peyrin, Y Seurin - Journal of Cryptology, 2021 - Springer
We present the Deoxys family of authenticated encryption schemes, which consists of
Deoxys-I and Deoxys-II. Both are nonce-based authenticated encryption schemes with …

Duel of the titans: The Romulus and Remus families of lightweight AEAD algorithms

T Iwata, M Khairallah, K Minematsu… - IACR Transactions on …, 2020 - tosc.iacr.org
In this article, we propose two new families of very lightweight and efficient authenticated
encryption with associated data (AEAD) modes, Romulus and Remus, that provide security …

Improved masking for tweakable blockciphers with applications to authenticated encryption

R Granger, P Jovanovic, B Mennink… - … Conference on the Theory …, 2016 - Springer
A popular approach to tweakable blockcipher design is via masking, where a certain
primitive (a blockcipher or a permutation) is preceded and followed by an easy-to-compute …

Alzette: A 64-Bit ARX-box: (Feat. CRAX and TRAX)

C Beierle, A Biryukov, L Cardoso dos Santos… - Advances in Cryptology …, 2020 - Springer
S-boxes are the only source of non-linearity in many symmetric primitives. While they are
often defined as being functions operating on a small space, some recent designs propose …

Security of symmetric primitives under incorrect usage of keys

P Farshim, C Orlandi, R Roşie - Cryptology ePrint Archive, 2017 - eprint.iacr.org
We study the security of symmetric primitives under the incorrect usage of keys. Roughly
speaking, a key-robust scheme does not output ciphertexts/tags that are valid with respect to …

TEDT, a leakage-resist AEAD mode for high physical security applications

F Berti, C Guo, O Pereira… - IACR Transactions …, 2020 - moving-the-social.ub.rub.de
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode
leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features:(i) It …

ZMAC: a fast tweakable block cipher mode for highly secure message authentication

T Iwata, K Minematsu, T Peyrin, Y Seurin - Annual international cryptology …, 2017 - Springer
We propose a new mode of operation called ZMAC allowing to construct a (stateless and
deterministic) message authentication code (MAC) from a tweakable block cipher (TBC) …

Tight security of TNT and beyond: Attacks, proofs and possibilities for the cascaded LRW paradigm

A Jha, M Khairallah, M Nandi, A Saha - … on the Theory and Applications of …, 2024 - Springer
Abstract Liskov, Rivest and Wagner laid the theoretical foundations for tweakable block
ciphers (TBC). In a seminal paper, they proposed two (up to) birthday-bound secure design …