{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T03:54:01Z","timestamp":1768017241071,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"FWO","award":["G.0835.16"],"award-info":[{"award-number":["G.0835.16"]}]},{"name":"Research Council KU Leuven","award":["C16\/15\/058"],"award-info":[{"award-number":["C16\/15\/058"]}]},{"name":"FWO","award":["S003321N"],"award-info":[{"award-number":["S003321N"]}]},{"name":"CyberSecurity Research Flanders","award":["VR20192203"],"award-info":[{"award-number":["VR20192203"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3623091","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"2546-2560","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0843-4885","authenticated-orcid":false,"given":"Amit Singh","family":"Bhati","sequence":"first","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8871-8532","authenticated-orcid":false,"given":"Erik","family":"Pohle","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5128-3608","authenticated-orcid":false,"given":"Aysajan","family":"Abidin","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0964-8711","authenticated-orcid":false,"given":"Elena","family":"Andreeva","sequence":"additional","affiliation":[{"name":"Technical University of Vienna, Vienna, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2005-9651","authenticated-orcid":false,"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Conference on the Theory and Application of Cryptology and Information Security","author":"Albrecht Martin","unstructured":"Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, and Tyge Tiessen. 2016. MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 191--219."},{"key":"e_1_3_2_1_2_1","volume-title":"Ciphers for MPC and FHE. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 430--454","author":"Albrecht Martin","year":"2015","unstructured":"Martin Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, and Michael Zohner. 2015. Ciphers for MPC and FHE. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 430--454."},{"key":"e_1_3_2_1_3_1","article-title":"Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols","volume":"2020","author":"Aly Abdelrahaman","year":"2020","unstructured":"Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, and Alan Szepieniec. 2020. Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols. IACR Transactions on Symmetric Cryptology, Vol. 2020, Issue 3 (2020), 1--45.","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2021.i3.1-35"},{"key":"e_1_3_2_1_5_1","volume-title":"Amit Singh Bhati, and Damian Viz\u00e1r","author":"Andreeva Elena","year":"2020","unstructured":"Elena Andreeva, Amit Singh Bhati, and Damian Viz\u00e1r. 2020a. Nonce-Misuse Security of the SAEF Authenticated Encryption mode. In Selected Areas in Cryptography."},{"key":"e_1_3_2_1_6_1","volume-title":"Amit Singh Bhati, and Damian Vizar","author":"Andreeva Elena","year":"2021","unstructured":"Elena Andreeva, Amit Singh Bhati, and Damian Vizar. 2021a. RUP Security of the SAEF Authenticated Encryption mode. Cryptology ePrint Archive, Paper 2021\/103. https:\/\/eprint.iacr.org\/2021\/103"},{"key":"e_1_3_2_1_7_1","volume-title":"New Results and Insighs on ForkAE. In NIST LWC workshop.","author":"Andreeva Elena","year":"2020","unstructured":"Elena Andreeva, Arne Deprez, Jowan Pittevils, Arnab Roy, Amit Singh Bhati, and Damian Viz\u00e1r. 2020b. New Results and Insighs on ForkAE. In NIST LWC workshop."},{"key":"e_1_3_2_1_8_1","volume-title":"ForkAE v.1. Submission to NIST LwC Standardization Process","author":"Andreeva Elena","year":"2019","unstructured":"Elena Andreeva, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy, and Damian Viz\u00e1r. 2019a. ForkAE v.1. Submission to NIST LwC Standardization Process (2019)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34621-8_6"},{"key":"e_1_3_2_1_10_1","volume-title":"Boosting Authenticated Encryption Robustness with Minimal Modifications. In Annual International Cryptology Conference. Springer, 3--33","author":"Ashur Tomer","year":"2017","unstructured":"Tomer Ashur, Orr Dunkelman, and Atul Luykx. 2017. Boosting Authenticated Encryption Robustness with Minimal Modifications. In Annual International Cryptology Conference. Springer, 3--33."},{"key":"e_1_3_2_1_11_1","volume-title":"GIFT: A Small Present. In International Conference on Cryptographic Hardware and Embedded Systems. Springer, 321--345","author":"Banik Subhadeep","year":"2017","unstructured":"Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, and Yosuke Todo. 2017. GIFT: A Small Present. In International Conference on Cryptographic Hardware and Embedded Systems. Springer, 321--345."},{"key":"e_1_3_2_1_12_1","unstructured":"Gregory V. Bard. 2006. A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL. Cryptology ePrint Archive Paper 2006\/136."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/646756.705383"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"e_1_3_2_1_15_1","first-page":"309","article-title":"The Power of Verification Queries in Message Authentication and Authenticated Encryption","volume":"2004","author":"Bellare Mihir","year":"2004","unstructured":"Mihir Bellare, Oded Goldreich, and Anton Mityagin. 2004. The Power of Verification Queries in Message Authentication and Authenticated Encryption. IACR Cryptology ePrint Archive, Vol. 2004 (2004), 309.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 9th ACM conference on Computer and communications security. In Proceedings of the 9th ACM Conference on Computer and Communications Security","author":"Bellare Mihir","year":"2002","unstructured":"Mihir Bellare, Tadayoshi Kohno, and Chanathip Namprempre. 2002. Proceedings of the 9th ACM conference on Computer and communications security. In Proceedings of the 9th ACM Conference on Computer and Communications Security (Washington, DC, USA) (CCS '02). Association for Computing Machinery, New York, NY, USA, 1--11."},{"key":"e_1_3_2_1_17_1","volume-title":"Turbospeedz: Double Your Online SPDZ! Improving SPDZ Using Function Dependent Preprocessing","author":"Ben-Efraim Aner","year":"2019","unstructured":"Aner Ben-Efraim, Michael Nielsen, and Eran Omri. 2019. Turbospeedz: Double Your Online SPDZ! Improving SPDZ Using Function Dependent Preprocessing. In Applied Cryptography and Network Security, Robert H. Deng, Val\u00e9rie Gauthier-Uma\u00f1a, Mart\u00edn Ochoa, and Moti Yung (Eds.). Springer International Publishing, Cham, 530--549."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_11"},{"key":"e_1_3_2_1_19_1","first-page":"S1","article-title":"Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus","volume":"2020","author":"Beyne Tim","year":"2020","unstructured":"Tim Beyne, Yu Long Chen, Christoph Dobraunig, and Bart Mennink. 2020. Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus. IACR Transactions on Symmetric Cryptology, Vol. 2020, S1 (Jun. 2020), 5--30.","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Amit Singh Bhati Erik Pohle Aysajan Abidin Elena Andreeva and Bart Preneel. 2023. Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation [Full Version]. Cryptology ePrint Archive Paper 2023\/1361.","DOI":"10.1145\/3576915.3623091"},{"key":"e_1_3_2_1_21_1","volume-title":"Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. In 10th USENIX Workshop on Offensive Technologies, WOOT, Natalie Silvanovich and Patrick Traynor (Eds.). USENIX Association.","author":"Hanno B\u00f6","year":"2016","unstructured":"Hanno B\u00f6 ck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, and Philipp Jovanovic. 2016. Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. In 10th USENIX Workshop on Offensive Technologies, WOOT, Natalie Silvanovich and Patrick Traynor (Eds.). USENIX Association."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"key":"e_1_3_2_1_23_1","volume-title":"Brand\u00e3o and Ren\u00e9 Peralta","author":"Lu\u00eds T. A.","year":"2023","unstructured":"Lu\u00eds T. A. N. Brand\u00e3o and Ren\u00e9 Peralta. 2023. NIST IR 8214C ipd NIST First Call for Multi-Party Threshold Schemes (Initial Public Draft). (2023)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-017-9273-9"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the Ninth Annual ACM Symposium on Theory of Computing","author":"Lawrence Carter J.","unstructured":"J. Lawrence Carter and Mark N. Wegman. 1977. Universal Classes of Hash Functions. In Proceedings of the Ninth Annual ACM Symposium on Theory of Computing (Boulder, Colorado, USA) (STOC '77). Association for Computing Machinery, New York, NY, USA, 106--112."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62214"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267973.3267977"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_18"},{"key":"e_1_3_2_1_29_1","volume-title":"Advances in Cryptology - ASIACRYPT","author":"Cosseron Orel","year":"2022","unstructured":"Orel Cosseron, Cl\u00e9ment Hoffmann, Pierrick M\u00e9aux, and Fran\u00e7ois-Xavier Standaert. 2022. Towards Globally Optimized Hybrid Homomorphic Encryption - Featuring the Elisabeth Stream Cipher. In Advances in Cryptology - ASIACRYPT 2022, Shweta Agrawal and Dongdai Lin (Eds.). Springer Nature Switzerland, Cham, 32--67."},{"key":"e_1_3_2_1_30_1","volume-title":"Smart","author":"Damg\u00e5rd Ivan","year":"2012","unstructured":"Ivan Damg\u00e5rd, Marcel Keller, Enrique Larraia, Christian Miles, and Nigel P. Smart. 2012a. Implementing AES via an actively\/covertly secure dishonest-majority MPC protocol. In International Conference on Security and Cryptography for Networks. Springer, 241--263."},{"key":"e_1_3_2_1_31_1","volume-title":"Smart","author":"Damg\u00e5rd Ivan","year":"2013","unstructured":"Ivan Damg\u00e5rd, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, and Nigel P. Smart. 2013. Practical covertly secure MPC for dishonest majority-or: breaking the SPDZ limits. In European Symposium on Research in Computer Security. Springer, 1--18."},{"key":"e_1_3_2_1_32_1","volume-title":"Nigel Smart, and Sarah Zakarias","author":"Damg\u00e5rd Ivan","year":"2012","unstructured":"Ivan Damg\u00e5rd, Valerio Pastro, Nigel Smart, and Sarah Zakarias. 2012b. Multiparty Computation from Somewhat Homomorphic Encryption. In Advances in Cryptology - CRYPTO 2012. Springer Berlin Heidelberg, Berlin, Heidelberg, 643--662."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1800094"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2206251"},{"key":"e_1_3_2_1_35_1","first-page":"2","article-title":"Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models","volume":"2016","author":"Endignoux Guillaume","year":"2017","unstructured":"Guillaume Endignoux and Damian Viz\u00e1r. 2017. Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models. IACR Transactions on Symmetric Cryptology, Vol. 2016, 2 (Feb. 2017), 125--144.","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"e_1_3_2_1_36_1","volume-title":"FSE 2012","author":"Fleischmann Ewan","year":"2012","unstructured":"Ewan Fleischmann, Christian Forler, and Stefan Lucks. 2012. McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes. In Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers (Lecture Notes in Computer Science, Vol. 7549), Anne Canteaut (Ed.). Springer, 196--215."},{"key":"e_1_3_2_1_37_1","volume-title":"Smart","author":"Gentry Craig","year":"2012","unstructured":"Craig Gentry, Shai Halevi, and Nigel P. Smart. 2012. Homomorphic Evaluation of the AES Circuit. In Advances in Cryptology - CRYPTO 2012, Reihaneh Safavi-Naini and Ran Canetti (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 850--867."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_23"},{"key":"e_1_3_2_1_40_1","unstructured":"Shay Gueron Adam Langley and Yehuda Lindell. 2017. AES-GCM-SIV: Specification and Analysis. Cryptology ePrint Archive Paper 2017\/168."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813613"},{"key":"e_1_3_2_1_42_1","volume-title":"Recent Advances and Trends in Lightweight Cryptography for IoT Security. In 2020 16th International Conference on Network and Service Management (CNSM). 1--5.","author":"Gunathilake Nilupulee A.","unstructured":"Nilupulee A. Gunathilake, Ahmed Al-Dubai, and William J. Buchana. 2020. Recent Advances and Trends in Lightweight Cryptography for IoT Security. In 2020 16th International Conference on Network and Service Management (CNSM). 1--5."},{"key":"e_1_3_2_1_43_1","volume-title":"ASIACRYPT (1)","author":"Hazay Carmit","unstructured":"Carmit Hazay, Peter Scholl, and Eduardo Soria-Vazquez. 2017. Low Cost Constant Round MPC Combining BMR and Oblivious Transfer. In ASIACRYPT (1). Springer, 598--628."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_24"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65277-7_3"},{"key":"e_1_3_2_1_46_1","article-title":"Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms","volume":"2020","author":"Iwata Tetsu","year":"2020","unstructured":"Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, and Thomas Peyrin. 2020. Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. IACR Transactions on Symmetric Cryptology, Vol. 2020, Issue 1 (2020), 43--120.","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"e_1_3_2_1_47_1","first-page":"4","article-title":"Reconsidering the Security Bound of AES-GCM-SIV","volume":"2017","author":"Iwata Tetsu","year":"2017","unstructured":"Tetsu Iwata and Yannick Seurin. 2017. Reconsidering the Security Bound of AES-GCM-SIV. IACR Transactions on Symmetric Cryptology, Vol. 2017, 4 (Dec. 2017), 240--267.","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_15"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_2"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978357"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_6"},{"key":"e_1_3_2_1_53_1","volume-title":"Hardware Implementations of Romulus: Exploring Nonce Misuse Resistance and Boolean Masking. In NIST Lightweight Cryptography Workshop.","author":"Khairallah Mustafa","year":"2022","unstructured":"Mustafa Khairallah and Shivam Bhasin. 2022. Hardware Implementations of Romulus: Exploring Nonce Misuse Resistance and Boolean Masking. In NIST Lightweight Cryptography Workshop."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWASI.2019.8791393"},{"key":"e_1_3_2_1_55_1","volume-title":"SSP: Self-Sovereign Privacy for Internet of Things Using Blockchain and MPC. In 2019 IEEE International Conference on Blockchain (Blockchain). 411--418","author":"Hyun-Jin Kim Tiffany","year":"2019","unstructured":"Tiffany Hyun-Jin Kim and Joshua Lampkins. 2019. SSP: Self-Sovereign Privacy for Internet of Things Using Blockchain and MPC. In 2019 IEEE International Conference on Blockchain (Blockchain). 411--418."},{"key":"e_1_3_2_1_56_1","volume-title":"Information Security and Cryptology - ICISC","author":"Krovetz Ted","year":"2000","unstructured":"Ted Krovetz and Phillip Rogaway. 2001. Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction. In Information Security and Cryptology - ICISC 2000, Dongho Won (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 73--89."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06734-6_20"},{"key":"e_1_3_2_1_58_1","volume-title":"USA","author":"Liskov Moses","year":"2002","unstructured":"Moses Liskov, Ronald L Rivest, and David Wagner. 2002. Tweakable block ciphers. In Advances in Cryptology-CRYPTO 2002: 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002 Proceedings 22. Springer, 31--46."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Atul Luykx Bart Preneel Elmar Tischhauser and Kan Yasuda. 2016. A MAC Mode for Lightweight Block Ciphers. In Fast Software Encryption Thomas Peyrin (Ed.). Springer Berlin Heidelberg 43--59.","DOI":"10.1007\/978-3-662-52993-5_3"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35423-7_4"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_13"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_24"},{"key":"e_1_3_2_1_64_1","volume-title":"CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part III. Springer, 315--345","author":"Naito Yusuke","year":"2022","unstructured":"Yusuke Naito, Yu Sasaki, and Takeshi Sugawara. 2022. Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking. In Advances in Cryptology-CRYPTO 2022: 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part III. Springer, 315--345."},{"key":"e_1_3_2_1_65_1","unstructured":"NIST. 2018. DRAFT Submission Requirements and Evaluation Criteria for the Lightweight Cryptography Standardization Process. https:\/\/csrc.nist.gov\/Projects\/Lightweight-Cryptography."},{"key":"e_1_3_2_1_66_1","volume-title":"CTCRYPT","author":"Peyrin Thomas","year":"2018","unstructured":"Thomas Peyrin. 2018. Lightweight Symmetric-Key Cryptography. Invited talk, CTCRYPT (2018). https:\/\/thomaspeyrin.github.io\/web\/assets\/docs\/invited\/CTCRYPT2018_slides.pdf."},{"key":"e_1_3_2_1_67_1","volume-title":"NIST Lightweight Cryptography Workshop","author":"Purnal Antoon","year":"2019","unstructured":"Antoon Purnal, Elena Andreeva, Arnab Roy, and Damian Viz\u00e1r. 2019. What the Fork: Implementation Aspects of a Forkcipher. In NIST Lightweight Cryptography Workshop 2019."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586125"},{"key":"e_1_3_2_1_69_1","first-page":"3","article-title":"Modes of Operation Suitable for Computing on Encrypted Data","volume":"2017","author":"Rotaru Dragos","year":"2017","unstructured":"Dragos Rotaru, Nigel P. Smart, and Martijn Stam. 2017. Modes of Operation Suitable for Computing on Encrypted Data. IACR Transactions on Symmetric Cryptology, Vol. 2017, 3 (Sep. 2017), 294--324.","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"e_1_3_2_1_70_1","volume-title":"Selected Areas in Cryptography-SAC 2016: 23rd International Conference, St. John's","author":"Schwabe Peter","year":"2016","unstructured":"Peter Schwabe and Ko Stoffelen. 2017. All the AES you need on Cortex-M3 and M4. In Selected Areas in Cryptography-SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers. Springer, 180--194."},{"key":"e_1_3_2_1_71_1","volume-title":"Smart and Frederik Vercauteren","author":"Nigel","year":"2014","unstructured":"Nigel P. Smart and Frederik Vercauteren. 2014. Fully homomorphic SIMD operations. Designs, codes and cryptography, Vol. 71, 1 (2014), 57--81."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.031"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623091","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:36:31Z","timestamp":1755740191000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623091"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":73,"alternative-id":["10.1145\/3576915.3623091","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3623091","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}