Author:
Abebe Abiy Tadesse,Shiferaw Yalemzewd Negash,Kumar P. G. V. Suresh
Publisher
Springer International Publishing
Reference14 articles.
1. Wu, H., Preneel, B.: AEGIS: a fast authenticated encryption algorithm (v1. 1). In: Submission to CAESAR (2016)
2. McGrew, D., Viega, J.: The Galois/counter mode of operation (GCM). In: Submission to NIST (2005)
3. Katsaiti, M., Sklavos, N.: Implementation efficiency and alternations, on CAESAR finalists: AEGIS approach. In: 2018 IEEE 16th International Conference on Dependable, Autonomic and Secure Computing, 16th International Conference on Pervasive Intelligence and Computing, 4th International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), pp. 661–665. IEEE (2018)
4. Kumar, S., Haj-Yihia, J., Khairallah, M., Chattopadhyay, A.: A comprehensive performance analysis of hardware implementations of CAESAR candidates. IACR Cryptol. ePrint Arch., 1261 (2017)
5. Abdellatif, K. M., Chotin-Avot, R., Mehrez, H.: AEGIS-based efficient solution for secure reconfiguration of FPGAs. In: Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, pp. 37–40. ACM (2016)