International audienceHighly efficient encryption and authentication of short messages is an essential requirement for enabling security in constrained scenarios such as the CAN FD in automotive systems (max. message size 64 bytes), massive IoT, critical communication domains of 5G, and Narrowband IoT, to mention a few. In addition, one of the NIST lightweight cryptography project requirements is that AEAD schemes shall be “optimized to be efficient for short messages (e.g., as short as 8 bytes)”.In this work we introduce and formalize a novel primitive in symmetric cryptography called forkcipher. A forkcipher is a keyed primitive expanding a fixed-lenght input to a fixed-length output. We define its security as indistinguishability under a...
Communications are one of the key functions in future vehicles and require protection. Cryptography ...
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers inten...
Despite the worldwide adoption of cryptographic standards, the rise of Internet of Things creates a ...
This is an extended version of the article with the same title accepted at Asiacrypt 2019.Internatio...
The need for lightweight cryptosystems is on a rise as they are compatible with energy- and memory- ...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
Forkciphers are a new kind of primitive proposed recently by Andreeva et al. for efficient encryptio...
Recently the ForkAES construction was proposed by Andreeva et al. for efficiently performing authent...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
Abstract. For constrained devices, standard cryptographic algorithms can be too big, too slow or too...
Abstract. In this paper, we present a novel lightweight authenticated cipher optimized for hardware ...
The use of a small block length is a common strategy when designing lightweight (tweakable) block ci...
Lightweight cryptography was developed in response to the increasing need to secure devices for the ...
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of hashing sche...
A multi-forkcipher (MFC) is a generalization of the forkcipher (FC) primitive introduced by Andreeva...
Communications are one of the key functions in future vehicles and require protection. Cryptography ...
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers inten...
Despite the worldwide adoption of cryptographic standards, the rise of Internet of Things creates a ...
This is an extended version of the article with the same title accepted at Asiacrypt 2019.Internatio...
The need for lightweight cryptosystems is on a rise as they are compatible with energy- and memory- ...
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion...
Forkciphers are a new kind of primitive proposed recently by Andreeva et al. for efficient encryptio...
Recently the ForkAES construction was proposed by Andreeva et al. for efficiently performing authent...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
Abstract. For constrained devices, standard cryptographic algorithms can be too big, too slow or too...
Abstract. In this paper, we present a novel lightweight authenticated cipher optimized for hardware ...
The use of a small block length is a common strategy when designing lightweight (tweakable) block ci...
Lightweight cryptography was developed in response to the increasing need to secure devices for the ...
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of hashing sche...
A multi-forkcipher (MFC) is a generalization of the forkcipher (FC) primitive introduced by Andreeva...
Communications are one of the key functions in future vehicles and require protection. Cryptography ...
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers inten...
Despite the worldwide adoption of cryptographic standards, the rise of Internet of Things creates a ...