sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices
From MaRDI portal
Publication:3194622
DOI10.1007/978-3-319-19962-7_26zbMath1391.94719OpenAlexW1891044804MaRDI QIDQ3194622
Donghoon Chang, Somitra Kumar Sanadhya, Megha Agrawal
Publication date: 20 October 2015
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-19962-7_26
authenticated encryptionCAESARcryptographic moduledecrypt-then-mask protocolremote key authenticated encryptionprivacy authenticity
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Authenticated encryption: relations among notions and analysis of the generic composition paradigm
- A new authenticated encryption technique for handling long ciphertexts in memory constrained devices
- Cryptanalysis of Ascon
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
- How to Securely Release Unverified Plaintext in Authenticated Encryption
- AEGIS: A Fast Authenticated Encryption Algorithm
- Concealment and Its Applications to Authenticated Encryption
- Sponge-Based Pseudo-Random Number Generators
- High-bandwidth encryption with low-bandwidth smartcards
- On the security of remotely keyed encryption
- NORX: Parallel and Scalable AEAD
- ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption
- Progress in Cryptology - INDOCRYPT 2004
- Fast Software Encryption
- Selected Areas in Cryptography
This page was built for publication: sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices