Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA)

A Ranea, V Rijmen - IET Information Security, 2022 - Wiley Online Library
Automated search methods based on Satisfiability Modulo Theory (SMT) problems are
being widely used to evaluate the security of block ciphers against distinguishing attacks …

Realse: Reconfigurable lightweight security engines for trusted edge devices

M El-Hadedy, X Guo - 2022 IEEE 4th International Conference …, 2022 - ieeexplore.ieee.org
Security has become a serious threat for IoT devices running on the edge. While IoT chips
are usually subject to numerous constraints such as power, form factor, cost and more. The …

Applications of Quasigroups in Cryptography and Coding Theory

S Markovski, V Bakeva, V Dimitrova, A Mileva… - Algebra without Borders …, 2023 - Springer
This survey article discusses some applications of quasigroups in cryptography and coding
theory. Here mainly results obtained by the authors of this article are considered and …

A 16-bit reconfigurable encryption processor for p-cipher

M El-Hadedy, H Mihajloska, D Gligoroski… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
This paper presents an improved hardware implementation of a 16-bit ARX (Add, Rotate,
and Xor) engine for one of the CAESAR second-round competition candidates, Pi-Cipher …

Segmentation and classification of human forms using ladar data

JS Albus, T Hong, T Chang - 35th IEEE Applied Imagery and …, 2006 - ieeexplore.ieee.org
High resolution LADAR (laser detection and ranging) images of scenes containing human
forms have been automatically segmented and simple algorithms have been developed for …

Reco-Pi: a reconfigurable cryptoprocessor for π-cipher

M El-Hadedy, A Kulkarni, D Stroobandt… - Journal of Parallel and …, 2019 - Elsevier
This paper presents the reconfigurable hardware design of an Encryptor and a Decryptor of
the 16-, 32-, and 64-bit versions of π-Cipher called “Reco-Pi”, one of candidate designs for …

Programmable processing element for crypto-systems on FPGAs

H Mihajloska Trpcheska, D Gligoroski… - Proc …, 2015 - repository.ukim.mk
This paper presents the design and analysis of an areaefficient programmable processing
element (PPE) for implementing diverse cryptographic systems and diverse bitwidths …

State recovery attacks against π-Cipher

J Alley, J Pieprzyk - Proceedings of the Australasian Computer Science …, 2016 - dl.acm.org
π-Cipher is one of the twenty-nine candidates in the second round of the CAESAR
competition for authenticated ciphers. π-Cipher uses a parallel sponge construction, based …

[PDF][PDF] CASCADA: Characteristic Automated Search of Cryptographic Algorithms for Distinguishing Attacks.

A Ranea, V Rijmen - IACR Cryptol. ePrint Arch., 2022 - pdfs.semanticscholar.org
Automated search methods based on Satisfiability Modulo Theories (SMT) problems are
being widely used to evaluate the security of block ciphers against distinguishing attacks …