Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
Comparative performance analysis of lightweight cryptography algorithms for IoT sensor nodes
The Internet of Things (IoT) has become an integral part of future solutions, ranging from
industrial to everyday human life applications. Adding a new level of intelligence to objects …
industrial to everyday human life applications. Adding a new level of intelligence to objects …
Fixslicing: A new gift representation
The GIFT family of lightweight block ciphers, published at CHES 2017, offers excellent
hardware performance figures and has been used, in full or in part, in several candidates of …
hardware performance figures and has been used, in full or in part, in several candidates of …
The oribatida v1. 3 family of lightweight authenticated encryption schemes
A Bhattacharjee, CM López, E List… - Journal of Mathematical …, 2021 - degruyter.com
Permutation-based modes have been established for lightweight authenticated encryption,
as can be seen from the high interest in the ongoing NIST lightweight competition. However …
as can be seen from the high interest in the ongoing NIST lightweight competition. However …
Fault attacks on authenticated encryption modes for GIFT
S Liu, J Guan, B Hu - IET Information Security, 2022 - Wiley Online Library
There are several authenticated encryption modes for block cipher GIFT in the NIST
lightweight cryptography standardisation process. In this study, the authors research on the …
lightweight cryptography standardisation process. In this study, the authors research on the …
Customized FPGA implementation of authenticated lightweight cipher fountain for IoT systems
Authenticated Encryption with Associated-Data (AEAD) can ensure both confidentiality and
integrity of information in encrypted communication. Distinctive variants are customized from …
integrity of information in encrypted communication. Distinctive variants are customized from …
Elastic-tweak: A framework for short tweak tweakable block cipher
Tweakable block cipher (TBC), a stronger notion than standard block ciphers, has wide-
scale applications in symmetric-key schemes. At a high level, it provides flexibility in design …
scale applications in symmetric-key schemes. At a high level, it provides flexibility in design …
Lightweight Yet Nonce-Misuse Secure Authenticated Encryption for Very Short Inputs
A Adomnicăi, K Minematsu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
We study authenticated encryption (AE) modes dedicated to very short messages, which are
crucial for Internet of Things applications. One of the most popular class of AE is built on …
crucial for Internet of Things applications. One of the most popular class of AE is built on …
Design space exploration of galois and fibonacci configuration based on espresso stream cipher
Fibonacci and Galois are two different kinds of configurations in stream ciphers. Although
many transformations between two configurations have been proposed, there is no sufficient …
many transformations between two configurations have been proposed, there is no sufficient …
Differential fault attack on SPN-based sponge and SIV-like AE schemes
This paper presents the first instance of a successful differential fault attack (DFA) on the
nonce-based authentication scheme photon-beetle, which was a finalist but not the winner …
nonce-based authentication scheme photon-beetle, which was a finalist but not the winner …