2021
DOI: 10.1007/978-3-030-92518-5_1
|View full text |Cite
|
Sign up to set email alerts
|

Revisiting the Security of COMET Authenticated Encryption Scheme

Abstract: Threshold Implementations have become a popular generic technique to construct circuits resilient against power analysis attacks. In this paper, we look to devise efficient threshold circuits for the lightweight block cipher family SKINNY. The only threshold circuits for this family are those proposed by its designers who decomposed the 8-bit S-box into four quadratic S-boxes, and constructed a 3-share byte-serial threshold circuit that executes the substitution layer over four cycles. In particular, we revisi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 35 publications
0
0
0
Order By: Relevance
“…However, the Counter mode provide only confi dentiality not message authentication. So GCM incorporates with Counter mode and builds on it by adding a Message Authentication Code (MAC) based on universal hashing provide message authentication that can keep up with our cipher [23]. It uses Polynomial hashing in the fi nite fi eld GF (2 n ) [24].…”
Section: Another Authentication Encryption Mode Is Cwc Combined Withmentioning
confidence: 99%
“…However, the Counter mode provide only confi dentiality not message authentication. So GCM incorporates with Counter mode and builds on it by adding a Message Authentication Code (MAC) based on universal hashing provide message authentication that can keep up with our cipher [23]. It uses Polynomial hashing in the fi nite fi eld GF (2 n ) [24].…”
Section: Another Authentication Encryption Mode Is Cwc Combined Withmentioning
confidence: 99%
“…Meanwhile, in [27], the authors used Artix-7, Spartan-6, and Cyclone-V FPGAs to implement the six NIST LWC round 2 candidate ciphers, SpoC, GIFT-COFB [28], COMET-AES [29], COMET-CHAM [29], Ascon [30], and Schwaemm and Esch [31]. Among all the schemes, it was clear that SpoC had the lowest area and power consumption, while Ascon had the highest throughput-to-area (TPA) ratio.…”
Section: Introductionmentioning
confidence: 99%