Search
Search Results
-
CAESAR: concept augmentation based semantic representation for cross-modal retrieval
With the increasing amount of multimedia data, cross-modal retrieval has attracted more attentions in the area of multimedia and computer vision. To...
-
The COLM Authenticated Encryption Scheme
In this work we present the COLM authenticated encryption (AE) scheme which is the second of the two winners in the defense in depth category of the...
-
Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) supported by the National Institute of Standards and...
-
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our information infrastructure. In this paper, we provide...
-
Differential Random Fault Attacks on Certain CAESAR Stream Ciphers
We show that a particular class of stream ciphers – namely those in which the output function contains a bitwise AND operation – are susceptible to a... -
Post-quantum Security of Tweakable Even-Mansour, and Applications
The tweakable Even-Mansour construction yields a tweakable block cipher from a public random permutation. We prove post-quantum security of tweakable... -
The
Deoxys AEAD FamilyWe present the
Deoxys family of authenticated encryption schemes, which consists ofDeoxys-I andDeoxys-II . Both are nonce-based authenticated... -
Cryptographic Competitions
Competitions are widely viewed as the safest way to select cryptographic algorithms. This paper surveys procedures that have been used in...
-
Exact Security Analysis of ASCON
The Ascon cipher suite, offering both authenticated encryption with associated data (AEAD) and hashing functionality, has recently emerged as the... -
Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery
In this paper, we analyze the security of authenticated encryption modes OTR (Minematsu, Eurocrypt 2014) and OPP (Granger et al., Eurocrypt 2016) in... -
Sycon: a new milestone in designing ASCON-like permutations
ASCON is one of the elegant designs of authenticated encryption with associated data (AEAD) that was selected as the first choice for lightweight... -
Strengthening ACORN Authenticated Cipher with Cellular Automata
The authenticated encryption (AE) scheme ACORN v3, a CAESAR competition finalist, has been shown to be particularly vulnerable against Differential... -
Differential fault analysis of NORX using variants of coupon collector problem
In this paper, we report the first DFA on nonce-based CAESAR scheme NORX (applicable to all the versions v1, v2.0, v3.0). This demonstrates a...
-
Experimentally Obtained Differential-Linear Distinguishers for Permutations of ASCON and DryGASCON
DryGASCON and Ascon are two similar authenticated encryption algorithms submitted to NIST’s recently finalized lightweight cryptography competition.... -
Challenges as catalysts: how Waymo’s Open Dataset Challenges shape AI development
Artificial intelligence (AI) and machine learning (ML) are becoming increasingly significant areas of research for scholars in science and technology...
-
Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security
This paper proposes a lightweight authenticated encryption (AE) scheme, called Light-OCB, which can be viewed as a lighter variant of the CAESAR... -
High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform
Authenticated encryption with associated data (AEAD) has become prominent over time because it offers authenticity and confidentiality...
-
Generic Attack on Duplex-Based AEAD Modes Using Random Function Statistics
Duplex-based authenticated encryption modes with a sufficiently large key length are proven to be secure up to the birthday bound... -
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128
We investigate a technique that needs to apply multiple random faults to the same target location and compare the impact of these faults on the...
-
Can Caesar Beat Galois?
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as its official goal to “identify a portfolio of...