This paper presents NORX8 and NORX16, the 8-bit and 16-bit versions of the authenticated cipher NORX, one of the CAESAR candidates. These new versions are better suited for low-end systems---such as ``internet of things\u27\u27 devices---than the original 32-bit and 64-bit versions: whereas 32-bit NORX requires 64 bytes of RAM or cache memory, NORX8 and NORX16 require just 16 and 32 bytes, respectively. Both of the low-end variants were designed to retain the security properties of the initial NORX and be fast on small CPUs
Introduced in 1996, NTRUEncrypt is not only one of the earliest but also one of the most scrutinized...
This paper proposes a lightweight authenticated encryption (AE) scheme, called Light-OCB, which can ...
Authenticated encryption with Associated Data (AEAD) plays a significant role in cryptography becaus...
NORX is one of the fifteen authenticated encryption algorithms that have reached the third round of ...
NORX is one of the fifteen authenticated encryption algorithms that have reached the third round of ...
NORX is one of the fifteen authenticated encryption algorithms that have reached the third round of ...
Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Th...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
In WISA\u2713, a novel lightweight block cipher named LEA was released. This algorithm has certain u...
This paper presents a lightweight blockcipher based authenticated encryption mode mainly focusing on...
The bit-sliding paper of Jean et al. (CHES 2017) showed that the smallest-size circuit for SPN based...
The U.S. National Institute of Standards and Technology is currently undertaking a process to evalua...
peer reviewedThe U.S. National Institute of Standards and Technology is currently undertaking a proc...
Introduced in 1996, NTRUEncrypt is not only one of the earliest but also one of the most scrutinized...
This paper proposes a lightweight authenticated encryption (AE) scheme, called Light-OCB, which can ...
Authenticated encryption with Associated Data (AEAD) plays a significant role in cryptography becaus...
NORX is one of the fifteen authenticated encryption algorithms that have reached the third round of ...
NORX is one of the fifteen authenticated encryption algorithms that have reached the third round of ...
NORX is one of the fifteen authenticated encryption algorithms that have reached the third round of ...
Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Th...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
In WISA\u2713, a novel lightweight block cipher named LEA was released. This algorithm has certain u...
This paper presents a lightweight blockcipher based authenticated encryption mode mainly focusing on...
The bit-sliding paper of Jean et al. (CHES 2017) showed that the smallest-size circuit for SPN based...
The U.S. National Institute of Standards and Technology is currently undertaking a process to evalua...
peer reviewedThe U.S. National Institute of Standards and Technology is currently undertaking a proc...
Introduced in 1996, NTRUEncrypt is not only one of the earliest but also one of the most scrutinized...
This paper proposes a lightweight authenticated encryption (AE) scheme, called Light-OCB, which can ...
Authenticated encryption with Associated Data (AEAD) plays a significant role in cryptography becaus...