In this paper, we present Xoodyak, a cryptographic primitive that can be used for hashing, encryption, MAC computation and authenticated encryption. Essentially, it is a duplex object …
Triggered by the increasing deployment of embedded cryptographic devices (eg, for the IoT), the design of authentication, encryption and authenticated encryption schemes …
This paper defines Spook: a sponge-based authenticated encryption with associated data algorithm. It is primarily designed to provide security against side-channel attacks at a low …
G Bertoni, J Daemen, S Hoffert, M Peeters… - Cryptology ePrint …, 2016 - eprint.iacr.org
In this paper, we introduce Farfalle, a new permutation-based construction for building a pseudorandom function (PRF). The PRF takes as input a key and a sequence of arbitrary …
Being one of the winning algorithms of the CAESAR competition and currently a second round candidate of the NIST lightweight cryptography standardization project, the …
B Mennink - Cryptology ePrint Archive, 2022 - eprint.iacr.org
At SAC 2011, Bertoni et al. introduced the keyed duplex construction as a tool to build permutation based authenticated encryption schemes. The construction was generalized to …
In this work we present a duplex-based authenticated encryption scheme Friet based on a new permutation called Friet-P. We designed Friet-P with a novel approach for cryptographic …
C Dobraunig, B Mennink - … 2019: 25th International Conference on the …, 2019 - Springer
Side-channel attacks, especially differential power analysis (DPA), pose a serious threat to cryptographic implementations deployed in a malicious environment. One way to counter …
The Duplex construction, introduced by Bertoni et al.(SAC 2011), is the Swiss Army knife of permutation-based cryptography. It can be used to realise a variety of cryptographic objects …