Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

Comparative performance analysis of lightweight cryptography algorithms for IoT sensor nodes

A Fotovvat, GME Rahman, SS Vedaei… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) has become an integral part of future solutions, ranging from
industrial to everyday human life applications. Adding a new level of intelligence to objects …

Fixslicing: A new gift representation

A Adomnicai, Z Najm, T Peyrin - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The GIFT family of lightweight block ciphers, published at CHES 2017, offers excellent
hardware performance figures and has been used, in full or in part, in several candidates of …

The oribatida v1. 3 family of lightweight authenticated encryption schemes

A Bhattacharjee, CM López, E List… - Journal of Mathematical …, 2021 - degruyter.com
Permutation-based modes have been established for lightweight authenticated encryption,
as can be seen from the high interest in the ongoing NIST lightweight competition. However …

Fault attacks on authenticated encryption modes for GIFT

S Liu, J Guan, B Hu - IET Information Security, 2022 - Wiley Online Library
There are several authenticated encryption modes for block cipher GIFT in the NIST
lightweight cryptography standardisation process. In this study, the authors research on the …

Customized FPGA implementation of authenticated lightweight cipher fountain for IoT systems

Z Shi, C Chen, G Yang, H Zhou, H **ong… - ACM Transactions on …, 2025 - dl.acm.org
Authenticated Encryption with Associated-Data (AEAD) can ensure both confidentiality and
integrity of information in encrypted communication. Distinctive variants are customized from …

Elastic-tweak: A framework for short tweak tweakable block cipher

A Chakraborti, N Datta, A Jha… - … on Cryptology in India, 2021 - Springer
Tweakable block cipher (TBC), a stronger notion than standard block ciphers, has wide-
scale applications in symmetric-key schemes. At a high level, it provides flexibility in design …

Lightweight Yet Nonce-Misuse Secure Authenticated Encryption for Very Short Inputs

A Adomnicăi, K Minematsu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
We study authenticated encryption (AE) modes dedicated to very short messages, which are
crucial for Internet of Things applications. One of the most popular class of AE is built on …

Design space exploration of galois and fibonacci configuration based on espresso stream cipher

Z Shi, C Chen, G Yang, H **ong, F Li, H Hu… - ACM Transactions on …, 2023 - dl.acm.org
Fibonacci and Galois are two different kinds of configurations in stream ciphers. Although
many transformations between two configurations have been proposed, there is no sufficient …

Differential fault attack on SPN-based sponge and SIV-like AE schemes

A Jana, G Paul - Journal of Cryptographic Engineering, 2024 - Springer
This paper presents the first instance of a successful differential fault attack (DFA) on the
nonce-based authentication scheme photon-beetle, which was a finalist but not the winner …