Abstract. The domain of lightweight cryptography focuses on crypto-graphic algorithms for extremely constrained devices. It is very costly to avoid nonce reuse in such environments, because this requires either a hardware source of randomness, or non-volatile memory to store a counter. At the same time, a lot of cryptographic schemes actually require the nonce assumption for their security. In this paper, we propose APE as the first permutation-based authenticated encryption scheme that is resistant against nonce misuse. We formally prove that APE is secure, based on the security of the underlying permutation. To decrypt, APE processes the ciphertext blocks in reverse order, and uses inverse permu-tation calls. APE therefore requires a perm...
Abstract: Pervasive computing utilizes devices with cost constraints and limited resources in terms...
Abstract. In this paper, we present a novel lightweight authenticated cipher optimized for hardware ...
Abstract. In CRYPTO 2003, Halevi and Rogaway proposed CMC, a tweakable enciphering scheme (TES) base...
The domain of lightweight cryptography focuses on cryptographic algorithms for extremely constrained...
Abstract. The domain of lightweight cryptography focuses on crypto-graphic algorithms for extremely ...
Lightweight authenticated ciphers are specially designed as authenticated encryption (AE) schemes fo...
Abstract. For constrained devices, standard cryptographic algorithms can be too big, too slow or too...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
Abstract. We propose a new authenticated encryption scheme PAEQ, which employs a fixed pub-lic permu...
This paper presents a lightweight, sponge-based authenticated encryption (AE) family called Beetle. ...
The sponge duplex is a popular mode of operation for constructing authenticated encryption schemes. ...
We present an efficient key wrapping scheme that uses a single public permutation as the basic eleme...
Lightweight cryptography was developed in response to the increasing need to secure devices for the ...
We introduce a new security notion that lies right in between pseudorandom permutations (PRPs) and s...
Abstract. We show how efficient and secure cryptographic mixing functions can be constructed from lo...
Abstract: Pervasive computing utilizes devices with cost constraints and limited resources in terms...
Abstract. In this paper, we present a novel lightweight authenticated cipher optimized for hardware ...
Abstract. In CRYPTO 2003, Halevi and Rogaway proposed CMC, a tweakable enciphering scheme (TES) base...
The domain of lightweight cryptography focuses on cryptographic algorithms for extremely constrained...
Abstract. The domain of lightweight cryptography focuses on crypto-graphic algorithms for extremely ...
Lightweight authenticated ciphers are specially designed as authenticated encryption (AE) schemes fo...
Abstract. For constrained devices, standard cryptographic algorithms can be too big, too slow or too...
We propose a new authenticated encryption scheme PAEQ, which employs a fixed public permutation. In ...
Abstract. We propose a new authenticated encryption scheme PAEQ, which employs a fixed pub-lic permu...
This paper presents a lightweight, sponge-based authenticated encryption (AE) family called Beetle. ...
The sponge duplex is a popular mode of operation for constructing authenticated encryption schemes. ...
We present an efficient key wrapping scheme that uses a single public permutation as the basic eleme...
Lightweight cryptography was developed in response to the increasing need to secure devices for the ...
We introduce a new security notion that lies right in between pseudorandom permutations (PRPs) and s...
Abstract. We show how efficient and secure cryptographic mixing functions can be constructed from lo...
Abstract: Pervasive computing utilizes devices with cost constraints and limited resources in terms...
Abstract. In this paper, we present a novel lightweight authenticated cipher optimized for hardware ...
Abstract. In CRYPTO 2003, Halevi and Rogaway proposed CMC, a tweakable enciphering scheme (TES) base...