2014
DOI: 10.1007/978-3-662-44709-3_22
|View full text |Cite
|
Sign up to set email alerts
|

ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption

Abstract: Abstract. This paper introduces our dedicated authenticated encryption scheme ICEPOLE. ICE-POLE is a high-speed hardware-oriented scheme, suitable for high-throughput network nodes or generally any environment where specialized hardware (such as FPGAs or ASICs) can be used to provide high data processing rates. ICEPOLE-128 (the primary ICEPOLE variant) is very fast. On the modern FPGA device Virtex 6, a basic iterative architecture of ICEPOLE reaches 41 Gbits/s, which is over 10 times faster than the equivalen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(26 citation statements)
references
References 17 publications
0
26
0
Order By: Relevance
“…Some of the available implementations are in the original documents of ICEPOLE [37] and SCREAM [21]. Cryptographic Engineering Research Group of George Mason University maintains a website [1] with results for some CAESAR submissions such as Deoxys [29], Ascon [18], PAEQ [14], ICEPOLE, Joltik [30], POET [6], CLOC [26], Keyac [13], OCB [32], PRIMATEs in its versions GIBBON and HANUMAN [8] and AES-COPA [10].…”
Section: B Hardware Implementation Of Authenticated Encryptionmentioning
confidence: 99%
“…Some of the available implementations are in the original documents of ICEPOLE [37] and SCREAM [21]. Cryptographic Engineering Research Group of George Mason University maintains a website [1] with results for some CAESAR submissions such as Deoxys [29], Ascon [18], PAEQ [14], ICEPOLE, Joltik [30], POET [6], CLOC [26], Keyac [13], OCB [32], PRIMATEs in its versions GIBBON and HANUMAN [8] and AES-COPA [10].…”
Section: B Hardware Implementation Of Authenticated Encryptionmentioning
confidence: 99%
“…There are standardized AESbased implementations [13], [16] and CAESAR candidates based on sponge constructions [2], [3], [18] and block ciphers [17], [15], [14] depicted. It seems that ASCON provides, together with Keccak MonkeyDuplex [18], excellent performance per area.…”
Section: A Related Workmentioning
confidence: 99%
“…All AES implementations are a magnitude slower than even the slowest ASCON-fast implementation. Only Norx [2] and ICEPOLE [3] achieve similar or higher performance. However, Norx is more than twice as large (59 kGE) as the largest ASCON design (26 kGE).…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Schemes1: Minalpher [55] OAE1d Leaks equality of block-aligned prefixes and the XOR of the block directly following this prefix. E.g., if , [53], ICEPOLE [46], iFeed [62], Jambu [60], Keyak [18], MORUS [61], NORX [13], STRIBOB [54] OAE0a Retains full security as long as all ( , ) pairs are unique among the encryption queries. If a pair repeats, all privacy is lost, but authenticity remains unchanged.…”
Section: Oae1mentioning
confidence: 99%