Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

Sancus 2.0: A low-cost security architecture for iot devices

J Noorman, JV Bulck, JT Mühlberg, F Piessens… - ACM Transactions on …, 2017 - dl.acm.org
The Sancus security architecture for networked embedded devices was proposed in 2013 at
the USENIX Security conference. It supports remote (even third-party) software installation …

How to securely release unverified plaintext in authenticated encryption

E Andreeva, A Bogdanov, A Luykx, B Mennink… - … Conference on the …, 2014 - Springer
Scenarios in which authenticated encryption schemes output decrypted plaintext before
successful verification raise many security issues. These situations are sometimes …

Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes

P Jovanovic, A Luykx, B Mennink - … on the Theory and Application of …, 2014 - Springer
The Sponge function is known to achieve 2 c/2 security, where c is its capacity. This bound
was carried over to keyed variants of the function, such as SpongeWrap, to achieve a min {2 …

Improved masking for tweakable blockciphers with applications to authenticated encryption

R Granger, P Jovanovic, B Mennink… - … Conference on the Theory …, 2016 - Springer
A popular approach to tweakable blockcipher design is via masking, where a certain
primitive (a blockcipher or a permutation) is preceded and followed by an easy-to-compute …

Statistical fault attacks on nonce-based authenticated encryption schemes

C Dobraunig, M Eichlseder, T Korak, V Lomné… - Advances in Cryptology …, 2016 - Springer
Since the first demonstration of fault attacks by Boneh et al. on RSA, a multitude of fault
attack techniques on various cryptosystems have been proposed. Most of these techniques …

Online authenticated-encryption and its nonce-reuse misuse-resistance

VT Hoang, R Reyhanitabar, P Rogaway… - Advances in Cryptology …, 2015 - Springer
A definition of online authenticated-encryption (OAE), call it OAE1, was given by
Fleischmann, Forler, and Lucks (2012). It has become a popular definitional target because …

Sponge-based control-flow protection for IoT devices

M Werner, T Unterluggauer… - 2018 IEEE European …, 2018 - ieeexplore.ieee.org
Embedded devices in the Internet of Things (IoT) face a wide variety of security challenges.
For example, software attackers perform code injection and code-reuse attacks on their …

[PDF][PDF] Low AND depth and efficient inverses: a guide on s-boxes for low-latency masking

B Bilgin, L De Meyer, S Duval, I Levi… - IACR Transactions on …, 2020 - lirias.kuleuven.be
In this work, we perform an extensive investigation and construct a portfolio of S-boxes
suitable for secure lightweight implementations, which aligns well with the ongoing NIST …

Understanding the duplex and its security

B Mennink - Cryptology ePrint Archive, 2022 - eprint.iacr.org
At SAC 2011, Bertoni et al. introduced the keyed duplex construction as a tool to build
permutation based authenticated encryption schemes. The construction was generalized to …