Permutation-Based Lightweight Authenticated Cipher with beyond Conventional Security

被引:0
|
作者
Zhang, Ping [1 ]
机构
[1] School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing,210023, China
关键词
Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Permutation-Based Lightweight Authenticated Cipher with Beyond Conventional Security
    Zhang, Ping
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [2] APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
    Andreeva, Elena
    Bilgin, Begul
    Bogdanov, Andrey
    Luykx, Atul
    Mennink, Bart
    Mouha, Nicky
    Yasuda, Kan
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 168 - 186
  • [3] Permutation-based Tweakable On-line Cipher with Improved Security Guarantees
    Zhang, Ping
    Hu, Honggang
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 457 - 466
  • [4] Beyond-birthday security for permutation-based Feistel networks
    Guo, Chun
    Zhang, Guoyan
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (03) : 407 - 440
  • [5] PAEQ: Parallelizable permutation-based authenticated encryption
    Biryukov, Alex (alex.biryukov@uni.lu), 1600, Springer Verlag (8783):
  • [6] Beyond-birthday security for permutation-based Feistel networks
    Chun Guo
    Guoyan Zhang
    Designs, Codes and Cryptography, 2021, 89 : 407 - 440
  • [7] Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size
    Hiraga, Yukihito
    Naito, Yusuke
    Sasaki, Yu
    Sugawara, Takeshi
    INFORMATION SECURITY, ISC 2023, 2023, 14411 : 351 - 371
  • [8] Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security
    Chakraborti, Avik
    Datta, Nilanjan
    Jha, Ashwin
    Mancillas-Lopez, Cuauhtemoc
    Nandi, Mridul
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2021, 2022, 13162 : 22 - 41
  • [9] Permutation-Based Hashing Beyond the Birthday Bound
    Lefevre, Charlotte
    Mennink, Bart
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 71 - 113
  • [10] Security/efficiency tradeoffs for permutation-based hashing
    Rogaway, Phillip
    Steinberger, John
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 220 - +