2021
DOI: 10.1587/transinf.2021ngp0008
|View full text |Cite
|
Sign up to set email alerts
|

Provable-Security Analysis of Authenticated Encryption Based on Lesamnta-LW in the Ideal Cipher Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Moreover, PHO-TON and SPONGENT are optimized for implementation on hardware, whereas Lesamnta-LW has been optimized for implementation in software. 67 Considering that SPONGENT and PHOTON have similar properties, a comparison of the characteristics of SPON-GENT and Lesamnta-LW to best fit our proposed PRNG algorithm was undertaken. In a study by Shoichi et al, a comparison analysis was performed for Lesamnta-LW using software-based implementations that resulted in 120-bit collision resistance and 54 bytes of RAM utilization, however SPONGENT results revealed 80-bit collision resistance using 1329 gate equivalent (GE).…”
Section: Choice Of Hashing Functionmentioning
confidence: 99%
See 3 more Smart Citations
“…Moreover, PHO-TON and SPONGENT are optimized for implementation on hardware, whereas Lesamnta-LW has been optimized for implementation in software. 67 Considering that SPONGENT and PHOTON have similar properties, a comparison of the characteristics of SPON-GENT and Lesamnta-LW to best fit our proposed PRNG algorithm was undertaken. In a study by Shoichi et al, a comparison analysis was performed for Lesamnta-LW using software-based implementations that resulted in 120-bit collision resistance and 54 bytes of RAM utilization, however SPONGENT results revealed 80-bit collision resistance using 1329 gate equivalent (GE).…”
Section: Choice Of Hashing Functionmentioning
confidence: 99%
“…Table 6 provides a comparison of Raspberry pi Zero W, 3B+ and pi4 based on technical specifications including processor, memory, connectivity options and power consumption in idle state. 67 The choice of Raspberry pi modules is made in such a way that the proposed algorithm can be tested on extremely resource constrained raspberry pi Zero W model (single core processor and 512 MB RAM) and in advanced Raspberry pi 4 model (Quad core processor and up to 8 GB RAM). Table 5 summarizes the technical specifications of Raspberry pi used for experimentation.…”
Section: Performance Testing On Iot Devicesmentioning
confidence: 99%
See 2 more Smart Citations