Filters








5 Hits in 6.4 sec

SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things

Subhadeep Banik, Andrey Bogdanov, Atul Luykx, Elmar Tischhauser
2018 IACR Transactions on Symmetric Cryptology  
Lightweight cryptography was developed in response to the increasing need to secure devices for the Internet of Things.  ...  We introduce a new authenticated encryption (AE) mode of operation, SUNDAE, specially targeted for constrained environments.  ...  Furthermore, although SUNDAE exhibits similarities with GCBC [Nan09] and OFB, the analyses of those schemes have limited applicability to SUNDAE as the combination of deterministic encryption and authentication  ... 
doi:10.46586/tosc.v2018.i3.1-35 fatcat:lkhk2wmxezed5izeuqic7hcaci

SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things

Subhadeep Banik, Andrey Bogdanov, Atul Luykx, Elmar Tischhauser
2018 IACR Transactions on Symmetric Cryptology  
Lightweight cryptography was developed in response to the increasing need to secure devices for the Internet of Things.  ...  We introduce a new authenticated encryption (AE) mode of operation, SUNDAE, specially targeted for constrained environments.  ...  The importance of good implementation characteristics on all platforms was already pointed out in [MM12] : the same cryptographic algorithms used on the small devices of the Internet of Things also have  ... 
doi:10.13154/tosc.v2018.i3.1-35 dblp:journals/tosc/BanikBLT18 fatcat:mtagxj3tyvfxbgken2rjw5jb6a

Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE

Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras
2020 IACR Transactions on Symmetric Cryptology  
Authenticated encryption schemes are usually expected to offer confidentiality and authenticity.  ...  authenticity in case of RUP.  ...  Introduction The rise of the Internet of Things comes with high demands on and constrictive conditions for cryptographic schemes.  ... 
doi:10.13154/tosc.v2019.i4.119-146 dblp:journals/tosc/ChangDDMNSS19 fatcat:yweuyn4vsnbxvi36npswxjmcba

FPGA Implementation of Some Second Round NIST Lightweight Cryptography Candidates

Brisbane Ovilla-Martínez, Cuauhtemoc Mancillas-López, Alberto F. Martínez-Herrera, José A. Bernal-Gutiérrez
2020 Electronics  
For almost one decade, the academic community has been working in the design and analysis of new lightweight primitives.  ...  As a part of the process, the candidates must demonstrate their suitability for hardware implementation. Cost and performance are two of the criteria to be evaluated.  ...  These communication scenarios include tasks designed for applications such as RFID tags, sensor nodes networks, healthcare, the Internet of Things (IoT), and Cyber-Physical Systems.  ... 
doi:10.3390/electronics9111940 fatcat:ar5so3aw4bbafgjefzele6xrom

Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD

Iftekhar Salam, Thian Hooi Ooi, Luxin Xue, Wei-Chuen Yau, Josef Pieprzyk, Raphael C.-W. Phan
2021 IEEE Access  
INTRODUCTION L IGHTWEIGHT Cryptography (LWC) aims to provide security and privacy for resource-constrained applications, e.g., embedded systems, Internet-of-Things (IoT) devices, radio frequency identification  ...  Recall that these lightweight AE algorithms, including Grain-128AEAD, are expected to be deployed in applications with embedded systems, Internet-of-Things (IoT) devices, radio frequency identification  ... 
doi:10.1109/access.2021.3078845 fatcat:kfrlficqrnbf5nvd6kw5odk7v4