Please use this identifier to cite or link to this item:
http://hdl.handle.net/20.500.12188/17788| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Gligoroski, Danilo | en_US |
| dc.contributor.author | Mihajloska Trpcheska, Hristina | en_US |
| dc.contributor.author | Samardjiska, Simona | en_US |
| dc.contributor.author | Jacobsen, Håkon | en_US |
| dc.contributor.author | Erlend Jensen, Rune | en_US |
| dc.contributor.author | El-Hadedy, Mohamed | en_US |
| dc.date.accessioned | 2022-05-30T09:17:15Z | - |
| dc.date.available | 2022-05-30T09:17:15Z | - |
| dc.date.issued | 2014-10-15 | - |
| dc.identifier.uri | http://hdl.handle.net/20.500.12188/17788 | - |
| dc.description.abstract | In today’s world of big data and rapidly increasing telecommunications, using secure cryptographic primitives that are parallelizable and incremental is becoming ever more important design goal. π-Cipher is parallel, incremental, nonce based authenticated encryption cipher with associated data. It is designed with the special purpose of providing confidentiality and integrity for big data in transit or at rest. It has, as an option, a secret part of the nonce which provides nonce-misuse resistance. The design involves operations of several solid cryptographic concepts such as the Encrypt-then-MAC principle, the XOR MAC scheme and the two-pass sponge construction. It contains parameters that can provide the functionality of tweakable block ciphers for authenticated encryption of data at rest. The security of the cipher relies on the core permutation function based on ARX (Addition, Rotation and XOR) operations. π-Cipher offers several security levels ranging from 96 to 256 bits. | en_US |
| dc.publisher | Springer International Publishing | en_US |
| dc.subject | Authenticated encryption, AEAD, parallelizability, incrementality, nonce-misuse resistance, sponge construction | en_US |
| dc.title | π-Cipher: Authenticated Encryption for Big Data | en_US |
| dc.type | Proceeding article | en_US |
| dc.relation.conference | Nordic Conference on Secure IT Systems | en_US |
| item.fulltext | With Fulltext | - |
| item.grantfulltext | open | - |
| Appears in Collections: | Faculty of Computer Science and Engineering: Conference papers | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| paper_18.pdf | 219.88 kB | Adobe PDF | View/Open |
Page view(s)
72
Last Week
2
2
Last month
8
8
checked on May 3, 2025
Download(s)
10
checked on May 3, 2025
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.