Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA)
A Ranea, V Rijmen - IET Information Security, 2022 - Wiley Online Library
Automated search methods based on Satisfiability Modulo Theory (SMT) problems are
being widely used to evaluate the security of block ciphers against distinguishing attacks …
being widely used to evaluate the security of block ciphers against distinguishing attacks …
Realse: Reconfigurable lightweight security engines for trusted edge devices
Security has become a serious threat for IoT devices running on the edge. While IoT chips
are usually subject to numerous constraints such as power, form factor, cost and more. The …
are usually subject to numerous constraints such as power, form factor, cost and more. The …
Applications of Quasigroups in Cryptography and Coding Theory
This survey article discusses some applications of quasigroups in cryptography and coding
theory. Here mainly results obtained by the authors of this article are considered and …
theory. Here mainly results obtained by the authors of this article are considered and …
A 16-bit reconfigurable encryption processor for p-cipher
This paper presents an improved hardware implementation of a 16-bit ARX (Add, Rotate,
and Xor) engine for one of the CAESAR second-round competition candidates, Pi-Cipher …
and Xor) engine for one of the CAESAR second-round competition candidates, Pi-Cipher …
Segmentation and classification of human forms using ladar data
JS Albus, T Hong, T Chang - 35th IEEE Applied Imagery and …, 2006 - ieeexplore.ieee.org
High resolution LADAR (laser detection and ranging) images of scenes containing human
forms have been automatically segmented and simple algorithms have been developed for …
forms have been automatically segmented and simple algorithms have been developed for …
Reco-Pi: a reconfigurable cryptoprocessor for π-cipher
This paper presents the reconfigurable hardware design of an Encryptor and a Decryptor of
the 16-, 32-, and 64-bit versions of π-Cipher called “Reco-Pi”, one of candidate designs for …
the 16-, 32-, and 64-bit versions of π-Cipher called “Reco-Pi”, one of candidate designs for …
Programmable processing element for crypto-systems on FPGAs
This paper presents the design and analysis of an areaefficient programmable processing
element (PPE) for implementing diverse cryptographic systems and diverse bitwidths …
element (PPE) for implementing diverse cryptographic systems and diverse bitwidths …
State recovery attacks against π-Cipher
J Alley, J Pieprzyk - Proceedings of the Australasian Computer Science …, 2016 - dl.acm.org
π-Cipher is one of the twenty-nine candidates in the second round of the CAESAR
competition for authenticated ciphers. π-Cipher uses a parallel sponge construction, based …
competition for authenticated ciphers. π-Cipher uses a parallel sponge construction, based …
[PDF][PDF] CASCADA: Characteristic Automated Search of Cryptographic Algorithms for Distinguishing Attacks.
A Ranea, V Rijmen - IACR Cryptol. ePrint Arch., 2022 - pdfs.semanticscholar.org
Automated search methods based on Satisfiability Modulo Theories (SMT) problems are
being widely used to evaluate the security of block ciphers against distinguishing attacks …
being widely used to evaluate the security of block ciphers against distinguishing attacks …