Abstract. We present ShMAC (Shallow MAC), a fixed input length message authentication code that performs most of the computation prior to the availability of the message. Specifically, ShMAC’s message-dependent computation is much faster and smaller in hardware than the evaluation of a pseudorandom permutation (PRP), and can be imple-mented by a small shallow circuit, while its precomputation consists of one PRP evaluation. A main building block for ShMAC is the notion of strong differential uniformity (SDU), which we introduce, and which may be of independent interest. We present an efficient SDU construction built from previously considered differentially uniform functions. Our motivating application is a system where a hardware-secured p...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
We investigate constructing message authentication schemes from symmetric cryptographic primitives, ...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message ...
International audienceLightweight cryptography is a topic of growing importance, with the goal to se...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
Abstract. We revisit the randomized approach followed in the design of the RMAC message authenticati...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
A message authentication code, MAC, is generated in an electronic circuit, wherein the MAC integrity...
Taking into consideration the rapid evolution of communication standards that include message authen...
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encry...
International audienceWe propose Chaskey: a very efficient Message Authentication Code (MAC...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Abstract. We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-bi...
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time ...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
We investigate constructing message authentication schemes from symmetric cryptographic primitives, ...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message ...
International audienceLightweight cryptography is a topic of growing importance, with the goal to se...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
Abstract. We revisit the randomized approach followed in the design of the RMAC message authenticati...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
A message authentication code, MAC, is generated in an electronic circuit, wherein the MAC integrity...
Taking into consideration the rapid evolution of communication standards that include message authen...
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encry...
International audienceWe propose Chaskey: a very efficient Message Authentication Code (MAC...
Abstract. “Hash then encrypt ” is an approach to message authentication, where first the message is ...
Abstract. We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-bi...
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time ...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
The security of a probabilistic Message Authentication Code (MAC) usually depends on the uniqueness ...
We investigate constructing message authentication schemes from symmetric cryptographic primitives, ...
We define and analyze a simple and fully parallelizable block-cipher mode of operation for message ...