TriviA and uTriviA : two fast and secure authenticated encryption schemes
In this paper, we propose two hardware optimized authenticated encryption schemes: TriviA-v2 and uTriviA. Both TriviA-v2, an efficient hardware optimization of TriviA-0-v1, and uTriviA are based on (i) a stream cipher for generating keys for the ciphertext and the tag, and (ii) a pairwise independen...
Main Authors: | Chakraborti, Avik, Chattopadhyay, Anupam, Muhammad Hassan, Mridul Nandi |
---|---|
Other Authors: | School of Computer Science and Engineering |
Format: | Journal Article |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/139518 |
Similar Items
-
SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers
by: Breier, Jakub, et al.
Published: (2018) -
Looting the LUTs : FPGA optimization of AES and AES-like ciphers for authenticated encryption
by: Khairallah, Mustafa, et al.
Published: (2020) -
The potential use of local index of biological integrity for tropical river assessment
by: Arman, Nor Zaiha
Published: (2024) -
Density-based clustering of data streams at multiple resolutions
by: Wan, Li
Published: (2013) -
Evolving large-scale data stream analytics based on scalable PANFIS
by: Za'in, Choiru, et al.
Published: (2021)