2022
DOI: 10.1109/access.2022.3147201
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated Encryption Schemes: A Systematic Review

Abstract: Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes in terms of security, efficiency, and design and to implement new ideas. However, a comprehensive systematic literature review (SLR) of the topic has not been provided to the best of the authors' knowledge. This st… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 151 publications
0
13
0
1
Order By: Relevance
“…There are different designs of sponge structure [4] as SpongeWrap [5], APE [6], CBEAM [7], Sp-AELM [8], Lsap [9], Beetle [10], Spookchain [11], T-sponge [12], TETsponge [13], CTR [14], ISAP [15], Beetle [16], Cyclist [17], Duplex [19,20].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…There are different designs of sponge structure [4] as SpongeWrap [5], APE [6], CBEAM [7], Sp-AELM [8], Lsap [9], Beetle [10], Spookchain [11], T-sponge [12], TETsponge [13], CTR [14], ISAP [15], Beetle [16], Cyclist [17], Duplex [19,20].…”
Section: Related Workmentioning
confidence: 99%
“…Each of them has advantages and drawbacks. The work [4] shows these drawbacks depend on the investigate of functional features. The functional features are parallelization, online, inverse-free, singlepass, N. misuse resist, and lightweight functional features.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Jimale et al [7] conducted a systematic literature review for classifying authenticated encryption (AE) schemes. Their study comprises a broad range of AE schemes, including submissions from the CAESAR and NIST LWC competitions.…”
Section: Related Workmentioning
confidence: 99%