The software performance of cryptographic schemes is an important factor in the decision to include such a scheme in real-world protocols like TLS, SSH or IPsec. In this paper, we develop a benchmarking framework to perform software performance measurements on authenticated encryption schemes. In particular, we apply our framework to independently benchmark the 29 remaining 2ndnd round candidates of the CAESAR competition. Many of these candidates have multiple parameter choices, or deploy software optimised versions raising our total number of benchmarked implementations to 232. We illustrate our results in various diagrams and hope that our contribution helps developers to find an appropriate cipher in their selection choice
Secure and efficient authenticated encryption (AE) constructions are important for protecting modern...
International audienceCipher algorithms have been created a long time ago to protect sensitive infor...
The goal of the paper is to discuss some possibilities of effective implementing cryptographic algor...
Abstract. In this paper, we propose a universal hardware Application Programming Interface (API) for...
peer reviewedCryptographic algorithms that can simultaneously provide both encryption and authentica...
In the context of CAESAR, a competition to elect a portfolio of algorithms, four propositions have b...
Free to read on publisher website We investigate six authenticated encryption schemes (ACORN, ASCON-...
In this paper we introduce an open framework for the benchmarking of lightweight block ciphers on a ...
Abstract. This report summarizes our results from security analysis covering all 57 CAESAR first rou...
Authenticated encryption with Associated Data (AEAD) plays a significant role in cryptography becaus...
Abstract. The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer...
In this paper we introduce FELICS, a free and open-source benchmarking framework designed for fair a...
International audienceCryptographic algorithms that can provide both encryption and authentication a...
Grain-128AEAD is a stream cipher supporting authenticated encryptionwith associated data, and it is ...
Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Th...
Secure and efficient authenticated encryption (AE) constructions are important for protecting modern...
International audienceCipher algorithms have been created a long time ago to protect sensitive infor...
The goal of the paper is to discuss some possibilities of effective implementing cryptographic algor...
Abstract. In this paper, we propose a universal hardware Application Programming Interface (API) for...
peer reviewedCryptographic algorithms that can simultaneously provide both encryption and authentica...
In the context of CAESAR, a competition to elect a portfolio of algorithms, four propositions have b...
Free to read on publisher website We investigate six authenticated encryption schemes (ACORN, ASCON-...
In this paper we introduce an open framework for the benchmarking of lightweight block ciphers on a ...
Abstract. This report summarizes our results from security analysis covering all 57 CAESAR first rou...
Authenticated encryption with Associated Data (AEAD) plays a significant role in cryptography becaus...
Abstract. The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer...
In this paper we introduce FELICS, a free and open-source benchmarking framework designed for fair a...
International audienceCryptographic algorithms that can provide both encryption and authentication a...
Grain-128AEAD is a stream cipher supporting authenticated encryptionwith associated data, and it is ...
Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Th...
Secure and efficient authenticated encryption (AE) constructions are important for protecting modern...
International audienceCipher algorithms have been created a long time ago to protect sensitive infor...
The goal of the paper is to discuss some possibilities of effective implementing cryptographic algor...