This work provides the first hardware implementations of PRIMATEs family of authenticated encryption algorithms. PRIMATEs are designed to be lightweight in hardware, hence we focus on designs for constrained devices. We provide several serial implementations, smallest of which requires only 1.2 kGE. Additionally, we present a variety of threshold implementations that range from 4.7 kGE to 10.3 kGE. The second part of this work presents a design of a lightweight PRIMATEs coprocessor. It is designed to conform versatile use of the core permutation, which allows implementation of the entire PRIMATEs family, with small differences in hardware. We implement HANUMAN-80 coprocessor, adapted for a 16-bit microcontroller from the Texas Instruments M...
Simple AEAD Hardware Interface (SÆHI) is a hardware cryptographic interface aimed at CAESAR Authenti...
Abstract—With the break of RSA and ECC cryptosystems in an era of quantum computing, asymmetric code...
Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Th...
This work provides the first hardware implementations of PRIMATEs family of authenticated encryption...
International audiencePRIMATEs are a family of permutation-based authenticated encryption algorithms...
With the trend to connect more and more devices to the Internet, authenticated encryption has become...
International audienceWe propose Chaskey: a very efficient Message Authentication Code (MAC...
Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, t...
© Springer International Publishing Switzerland 2014. We propose Chaskey: a very efficient Message A...
Abstract. Due to the tight cost and constrained resources of high-volume consumer devices such as RF...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
In this report, we analyze the hardware implementations of 10 candidates for Round 2 of the NIST lig...
Simple AEAD Hardware Interface (SÆHI) is a hardware cryptographic interface aimed at CAESAR Authenti...
Authenticated encryption is a symmetric cryptography scheme that provides both confidentiality and a...
6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016 ...
Simple AEAD Hardware Interface (SÆHI) is a hardware cryptographic interface aimed at CAESAR Authenti...
Abstract—With the break of RSA and ECC cryptosystems in an era of quantum computing, asymmetric code...
Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Th...
This work provides the first hardware implementations of PRIMATEs family of authenticated encryption...
International audiencePRIMATEs are a family of permutation-based authenticated encryption algorithms...
With the trend to connect more and more devices to the Internet, authenticated encryption has become...
International audienceWe propose Chaskey: a very efficient Message Authentication Code (MAC...
Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, t...
© Springer International Publishing Switzerland 2014. We propose Chaskey: a very efficient Message A...
Abstract. Due to the tight cost and constrained resources of high-volume consumer devices such as RF...
International audienceOver the past 10 years, the multitude of highly constrained applications such ...
In this report, we analyze the hardware implementations of 10 candidates for Round 2 of the NIST lig...
Simple AEAD Hardware Interface (SÆHI) is a hardware cryptographic interface aimed at CAESAR Authenti...
Authenticated encryption is a symmetric cryptography scheme that provides both confidentiality and a...
6th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2016 ...
Simple AEAD Hardware Interface (SÆHI) is a hardware cryptographic interface aimed at CAESAR Authenti...
Abstract—With the break of RSA and ECC cryptosystems in an era of quantum computing, asymmetric code...
Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Th...