Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

Robust authenticated-encryption AEZ and the problem that it solves

VT Hoang, T Krovetz, P Rogaway - … on the Theory and Applications of …, 2015 - Springer
With a scheme for robust authenticated-encryption a user can select an arbitrary value λ\! ≥
0 and then encrypt a plaintext of any length into a ciphertext that's λ characters longer. The …

[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices

Z AlJabri, J Abawajy, S Huda - Wireless Communications and …, 2023 - Wiley Online Library
Internet of Things (IoT) is a promising technology for creating smart environments, smart
systems, and smart services. Since security is a fundamental requirement of IoT platforms …

Blockcipher-based authenticated encryption: how small can we go?

A Chakraborti, T Iwata, K Minematsu… - … Hardware and Embedded …, 2017 - Springer
This paper presents a design of authenticated encryption (AE) focusing on minimizing the
implementation size, ie, hardware gates or working memory on software. The scheme is …

[PDF][PDF] Dumbo, jumbo, and delirium: Parallel authenticated encryption for the lightweight circus

T Beyne, YL Chen, C Dobraunig… - IACR Transactions on …, 2020 - lirias.kuleuven.be
With the trend to connect more and more devices to the Internet, authenticated encryption
has become a major backbone in securing the communication, not only between these …

Rogue decryption failures: Reconciling AE robustness notions

G Barwell, D Page, M Stam - … , IMACC 2015, Oxford, UK, December 15-17 …, 2015 - Springer
An authenticated encryption scheme is deemed secure (AE) if ciphertexts both look like
random bitstrings and are unforgeable. AE is a much stronger notion than the traditional IND …

Indifferentiable authenticated encryption

M Barbosa, P Farshim - Advances in Cryptology–CRYPTO 2018: 38th …, 2018 - Springer
Abstract We study Authenticated Encryption with Associated Data (AEAD) from the viewpoint
of composition in arbitrary (single-stage) environments. We use the indifferentiability …

Blockcipher-based authenticated encryption: how small can we go?

A Chakraborti, T Iwata, K Minematsu, M Nandi - Journal of Cryptology, 2020 - Springer
This paper presents a lightweight blockcipher-based authenticated encryption mode mainly
focusing on minimizing the implementation size, ie, hardware gates or working memory on …

Collision attacks against CAESAR candidates: forgery and key-recovery against AEZ and Marble

T Fuhr, G Leurent, V Suder - International Conference on the Theory and …, 2015 - Springer
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset
Codebook). These algorithms use secret offsets (masks derived from a whitening key) to turn …

Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition

F Zhang, Z Liang, B Yang, X Zhao, S Guo… - Frontiers of Information …, 2018 - Springer
Abstract The Competition for Authenticated Encryption: Security, Applicability, and
Robustness (CAESAR) supported by the National Institute of Standards and Technology …