[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices

Z AlJabri, J Abawajy, S Huda - Wireless Communications and …, 2023 - Wiley Online Library
Internet of Things (IoT) is a promising technology for creating smart environments, smart
systems, and smart services. Since security is a fundamental requirement of IoT platforms …

Robot Operating System 2: The need for a holistic security approach to robotic architectures

V DiLuoffo, WR Michalson… - International Journal of …, 2018 - journals.sagepub.com
It is no secret that robotic systems are expanding into many human roles or are augmenting
human roles. The Robot Operating System is an open-source standard for the robotic …

Correlation power analysis of modes of encryption in AES and its countermeasures

S Fahd, M Afzal, H Abbas, W Iqbal… - Future Generation …, 2018 - Elsevier
Secure implementation of cryptographic algorithms is an important area of research.
Cryptographer prefers to secure algorithms against known attacks; however designer …

Message authentication based on cryptographically secure CRC without polynomial irreducibility test

E Dubrova, M Näslund, G Selander… - Cryptography and …, 2018 - Springer
In this paper, we present a message authentication scheme based on cryptographically
secure cyclic redundancy check (CRC). Similarly to previously proposed cryptographically …

Twisted polynomials and forgery attacks on GCM

MA Abdelraheem, P Beelen, A Bogdanov… - Advances in Cryptology …, 2015 - Springer
Polynomial hashing as an instantiation of universal hashing is a widely employed method
for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous …

Automating the development of chosen ciphertext attacks

G Beck, M Zinkus, M Green - 29th USENIX Security Symposium …, 2020 - usenix.org
In this work we investigate the problem of automating the development of adaptive chosen
ciphertext attacks on systems that contain vulnerable format oracles. Unlike previous …

Security analysis of SFrame

T Isobe, R Ito, K Minematsu - … : 26th European Symposium on Research in …, 2021 - Springer
As people become more and more privacy conscious, the need for end-to-end encryption
(E2EE) has become widely recognized. We study the security of SFrame, an E2EE …

Reforgeability of authenticated encryption schemes

C Forler, E List, S Lucks, J Wenzel - Australasian Conference on …, 2017 - Springer
This work pursues the idea of multi-forgery attacks as introduced by Ferguson in 2002. We
recoin reforgeability for the complexity of obtaining further forgeries once a first forgery has …

Optimal forgeries against polynomial-based MACs and GCM

A Luykx, B Preneel - Advances in Cryptology–EUROCRYPT 2018: 37th …, 2018 - Springer
Polynomial-based authentication algorithms, such as GCM and Poly1305, have seen
widespread adoption in practice. Due to their importance, a significant amount of attention …

A new stand-alone MAC construct called SMAC

D Wang, A Maximov, P Ekdahl… - Cryptology ePrint …, 2024 - eprint.iacr.org
In this paper, we present a new efficient stand-alone MAC construct based on processing
using the FSM part of the stream cipher family SNOW, which in turn uses the AES round …