The design and implementation of XForró14-Poly1305: a new Authenticated Encryption Scheme

M Coutinho, I Passos, F Borges - … em Segurança da Informação e de …, 2023 - sol.sbc.org.br
No Asiacrypt 2022 e em sua versão estendida no Journal of Cryptology 2023, Coutinho et
al. propõe o algoritmo Forró, uma nova cifra de fluxo baseada em ARX com um design …

[PDF][PDF] KIASU v1

J Jean, I Nikolic, T Peyrin - Submitted to the CAESAR competition, 2014 - Citeseer
In this note, we propose KIASU, a new authenticated encryption design based on a
tweakable block cipher KIASU-BC that uses the well-studied AES round function as a …

[PDF][PDF] Deoxys v1. 3

J Jean, I Nikolić, T Peyrin - CAESAR Round, 2015 - competitions.cr.yp.to
In this note, we propose Deoxys, a new authenticated encryption design based on a
tweakable block cipher Deoxys-BC using the well-studied AES round function as a building …

FELICS-AEAD: benchmarking of lightweight authenticated encryption algorithms

L Cardoso dos Santos, J Großschädl… - Smart Card Research and …, 2020 - Springer
Cryptographic algorithms that can simultaneously provide both encryption and
authentication play an increasingly important role in modern security architectures and …

Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition

F Zhang, Z Liang, B Yang, X Zhao, S Guo… - Frontiers of Information …, 2018 - Springer
Abstract The Competition for Authenticated Encryption: Security, Applicability, and
Robustness (CAESAR) supported by the National Institute of Standards and Technology …

: Towards More Efficient and BBB-secure AE From a Single Public Permutation

A Bhattacharjee, R Bhaumik, A Dutta… - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Four recent trends have emerged in the evolution of authenticated encryption schemes:(1)
Regarding simplicity, the adoption of public permutations as primitives allows for sparing a …

Array-based statistical analysis of the MK-3 authenticated encryption scheme

P Bajorski, A Kaminsky, M Kurdziel… - MILCOM 2018-2018 …, 2018 - ieeexplore.ieee.org
Authenticated encryption (AE) schemes are symmetric key cryptographic methods that
support confidentiality, integrity and source authentication. There are many AE algorithms in …

[PDF][PDF] The STRIBOBr1 authenticated encryption algorithm

MJO Saarinen - CAESAR submission, 2014 - competitions.cr.yp.to
The STRIBOBr1 Authenticated Encryption Algorithm Page 1 The STRIBOBr1 Authenticated
Encryption Algorithm First Round CAESAR Competition Submission Document Designer and …

Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

Duel of the titans: the romulus and remus families of lightweight AEAD algorithms

T Iwata, M Khairallah, K Minematsu… - IACR Transactions on …, 2020 - tosc.iacr.org
In this article, we propose two new families of very lightweight and efficient authenticated
encryption with associated data (AEAD) modes, Romulus and Remus, that provide security …