MILCOM 2015 - 2015 IEEE Military Communications Conference 2015
DOI: 10.1109/milcom.2015.7357416
|View full text |Cite
|
Sign up to set email alerts
|

Customizable sponge-based authenticated encryption using 16-bit S-boxes

Abstract: Abstract-Authenticated encryption (AE) is a symmetric key cryptographic scheme that aims to provide both confidentiality and data integrity. There are many AE algorithms in existence today. However, they are often far from ideal in terms of efficiency and ease of use. For this reason, there is ongoing effort to develop new AE algorithms that are secure, efficient, and easy to use.The sponge construction is a relatively new cryptographic primitive that has gained popularity since the sponge-based KECCAK algorit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…The complexity in one round may increase if the component size is increased. Therefore, large-size components are required for secure and efficient encryption while reducing rounds [1]- [5]. However, the security measurement becomes more complicated as the size of components increases.…”
Section: Introductionmentioning
confidence: 99%
“…The complexity in one round may increase if the component size is increased. Therefore, large-size components are required for secure and efficient encryption while reducing rounds [1]- [5]. However, the security measurement becomes more complicated as the size of components increases.…”
Section: Introductionmentioning
confidence: 99%
“…There are different designs of sponge structure [4] as SpongeWrap [5], APE [6], CBEAM [7], Sp-AELM [8], Lsap [9], Beetle [10], Spookchain [11], T-sponge [12], TETsponge [13], CTR [14], ISAP [15], Beetle [16], Cyclist [17], Duplex [19,20].…”
Section: Related Workmentioning
confidence: 99%
“…Cyclist [17,18] investigated Inverse-free, single-pass, Lightweight, and RUP Security functional features only. Duplex [19] investigated Inverse-free functional feature only.…”
Section: Related Workmentioning
confidence: 99%
“…Each absorbed r-bit plaintext block M i is used to produce one ciphertext block CT i , and the authentication tag T is outputted at the end. The details of permutation f , each round operation and overall security analysis are described in [1], [2], [10].…”
Section: A Mk-3 Authenticated Encryption Algorithmmentioning
confidence: 99%