Abstract. We show how efficient and secure cryptographic mixing functions can be constructed from low-degree rotation-invariant φ functions rather than conven-tional S-Boxes. These novel functions have surprising properties; many exhibit inherent feeble (Boolean circuit) one-wayness and offer speed/area tradeoffs un-obtainable with traditional constructs. Recent theoretical results indicate that even if the inverse is not explicitly computed in an implementation, its degree plays a fundamental role to the security of the iterated composition. To illustrate these properties, we present CBEAM, a Cryptographic Sponge Permutation based on a single 5 × 1-bit Boolean function. This simple nonlinear function is used to con-struct a 16-bit rotation...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
The keyed sponge is a well-accepted method for message authentication. It processes data at a certai...
© International Association for Cryptologic Research 2015. We provide a security analysis for full-s...
Abstract: Efficient hashing is a centerpiece of modern Cryptography. The progress in computing techn...
Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both conf...
Abstract. The domain of lightweight cryptography focuses on crypto-graphic algorithms for extremely ...
The sponge duplex is a popular mode of operation for constructing authenticated encryption schemes. ...
© International Association for Cryptologic Research 2014. The Sponge function is known to achieve ...
The domain of lightweight cryptography focuses on cryptographic algorithms for extremely constrained...
Many implementations of secure computation use fixed-key AES (modeled as a random permutation); this...
Abstract. The domain of lightweight cryptography focuses on crypto-graphic algorithms for extremely ...
Lightweight authenticated ciphers are specially designed as authenticated encryption (AE) schemes fo...
Over the last few years, there has been a surge of new cryptographic results, including Laconic obli...
This paper presents a lightweight, sponge-based authenticated encryption (AE) family called Beetle. ...
© International Association for Cryptologic Research 2015. Sponge functions were originally proposed...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
The keyed sponge is a well-accepted method for message authentication. It processes data at a certai...
© International Association for Cryptologic Research 2015. We provide a security analysis for full-s...
Abstract: Efficient hashing is a centerpiece of modern Cryptography. The progress in computing techn...
Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both conf...
Abstract. The domain of lightweight cryptography focuses on crypto-graphic algorithms for extremely ...
The sponge duplex is a popular mode of operation for constructing authenticated encryption schemes. ...
© International Association for Cryptologic Research 2014. The Sponge function is known to achieve ...
The domain of lightweight cryptography focuses on cryptographic algorithms for extremely constrained...
Many implementations of secure computation use fixed-key AES (modeled as a random permutation); this...
Abstract. The domain of lightweight cryptography focuses on crypto-graphic algorithms for extremely ...
Lightweight authenticated ciphers are specially designed as authenticated encryption (AE) schemes fo...
Over the last few years, there has been a surge of new cryptographic results, including Laconic obli...
This paper presents a lightweight, sponge-based authenticated encryption (AE) family called Beetle. ...
© International Association for Cryptologic Research 2015. Sponge functions were originally proposed...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
The keyed sponge is a well-accepted method for message authentication. It processes data at a certai...
© International Association for Cryptologic Research 2015. We provide a security analysis for full-s...