{"id":"https://openalex.org/W4400414689","doi":"https://doi.org/10.62056/a3n59qgxq","title":"Twinkle: A family of Low-latency Schemes for Authenticated Encryption and Pointer Authentication","display_name":"Twinkle: A family of Low-latency Schemes for Authenticated Encryption and Pointer Authentication","publication_year":2024,"publication_date":"2024-07-08","ids":{"openalex":"https://openalex.org/W4400414689","doi":"https://doi.org/10.62056/a3n59qgxq"},"language":"en","primary_location":{"id":"doi:10.62056/a3n59qgxq","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a3n59qgxq","pdf_url":"https://cic.iacr.org/p/1/2/20/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://cic.iacr.org/p/1/2/20/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043180876","display_name":"Jianhua Wang","orcid":"https://orcid.org/0009-0003-8895-676X"},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]},{"id":"https://openalex.org/I4210160618","display_name":"Huawei Technologies (United Kingdom)","ror":"https://ror.org/056gzgs71","country_code":"GB","type":"company","lineage":["https://openalex.org/I2250955327","https://openalex.org/I4210160618"]}],"countries":["CN","GB"],"is_corresponding":true,"raw_author_name":"Jianhua Wang","raw_affiliation_strings":["Shield Lab, Huawei Technologies Co., Ltd"],"affiliations":[{"raw_affiliation_string":"Shield Lab, Huawei Technologies Co., Ltd","institution_ids":["https://openalex.org/I4210160618","https://openalex.org/I2250955327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087767046","display_name":"Tao Huang","orcid":"https://orcid.org/0000-0002-3545-1122"},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Huang","raw_affiliation_strings":["Shield Lab, Huawei International Pte. Ltd"],"affiliations":[{"raw_affiliation_string":"Shield Lab, Huawei International Pte. Ltd","institution_ids":["https://openalex.org/I2250955327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100778373","display_name":"Shuang Wu","orcid":"https://orcid.org/0000-0001-9512-2358"},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuang Wu","raw_affiliation_strings":["Shield Lab, Huawei International Pte. Ltd"],"affiliations":[{"raw_affiliation_string":"Shield Lab, Huawei International Pte. Ltd","institution_ids":["https://openalex.org/I2250955327"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100629531","display_name":"Zilong Liu","orcid":"https://orcid.org/0000-0002-5851-4261"},"institutions":[{"id":"https://openalex.org/I4210100005","display_name":"Silicon Technologies (United States)","ror":"https://ror.org/013qwzt07","country_code":"US","type":"company","lineage":["https://openalex.org/I4210100005"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zilong Liu","raw_affiliation_strings":["HiSilicon Technologies Co. Ltd"],"affiliations":[{"raw_affiliation_string":"HiSilicon Technologies Co. Ltd","institution_ids":["https://openalex.org/I4210100005"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5043180876"],"corresponding_institution_ids":["https://openalex.org/I2250955327","https://openalex.org/I4210160618"],"apc_list":null,"apc_paid":null,"fwci":1.0425,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.80055733,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.717313289642334},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5766634941101074},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.5281667113304138},{"id":"https://openalex.org/keywords/pointer","display_name":"Pointer (user interface)","score":0.5106385350227356},{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.4466250538825989},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.44263485074043274},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3548966944217682},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.2853243350982666}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.717313289642334},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5766634941101074},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.5281667113304138},{"id":"https://openalex.org/C150202949","wikidata":"https://www.wikidata.org/wiki/Q107602","display_name":"Pointer (user interface)","level":2,"score":0.5106385350227356},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.4466250538825989},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.44263485074043274},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3548966944217682},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.2853243350982666},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.62056/a3n59qgxq","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a3n59qgxq","pdf_url":"https://cic.iacr.org/p/1/2/20/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.62056/a3n59qgxq","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a3n59qgxq","pdf_url":"https://cic.iacr.org/p/1/2/20/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4400414689.pdf","grobid_xml":"https://content.openalex.org/works/W4400414689.grobid-xml"},"referenced_works_count":63,"referenced_works":["https://openalex.org/W83473285","https://openalex.org/W107556815","https://openalex.org/W114757832","https://openalex.org/W156355313","https://openalex.org/W197228877","https://openalex.org/W1482922493","https://openalex.org/W1524430769","https://openalex.org/W1541703086","https://openalex.org/W1573725807","https://openalex.org/W1599175145","https://openalex.org/W1605416950","https://openalex.org/W1883151075","https://openalex.org/W1894646615","https://openalex.org/W1908897196","https://openalex.org/W1985623009","https://openalex.org/W2061643296","https://openalex.org/W2064939672","https://openalex.org/W2109450547","https://openalex.org/W2111902481","https://openalex.org/W2147436504","https://openalex.org/W2166473670","https://openalex.org/W2170618460","https://openalex.org/W2175377689","https://openalex.org/W2234576048","https://openalex.org/W2281317404","https://openalex.org/W2293947265","https://openalex.org/W2476423892","https://openalex.org/W2490548159","https://openalex.org/W2504919933","https://openalex.org/W2549714595","https://openalex.org/W2549924696","https://openalex.org/W2573138350","https://openalex.org/W2576037784","https://openalex.org/W2579400469","https://openalex.org/W2599205485","https://openalex.org/W2613314374","https://openalex.org/W2728494734","https://openalex.org/W2741840250","https://openalex.org/W2769206030","https://openalex.org/W2929923944","https://openalex.org/W3003689084","https://openalex.org/W3088704016","https://openalex.org/W3091546435","https://openalex.org/W3093837422","https://openalex.org/W3095501038","https://openalex.org/W3108390211","https://openalex.org/W3108792892","https://openalex.org/W3143950643","https://openalex.org/W3146780285","https://openalex.org/W3158209657","https://openalex.org/W3188169042","https://openalex.org/W3205730643","https://openalex.org/W3206836621","https://openalex.org/W3210705930","https://openalex.org/W4231286867","https://openalex.org/W4241072010","https://openalex.org/W4282040101","https://openalex.org/W4288057728","https://openalex.org/W4308219510","https://openalex.org/W4310480262","https://openalex.org/W4312790749","https://openalex.org/W4386844063","https://openalex.org/W4392742439"],"related_works":["https://openalex.org/W2387387477","https://openalex.org/W2394051415","https://openalex.org/W2592488952","https://openalex.org/W4388218401","https://openalex.org/W4255928847","https://openalex.org/W2352114091","https://openalex.org/W121845590","https://openalex.org/W4241809317","https://openalex.org/W2100090372","https://openalex.org/W4361205702"],"abstract_inverted_index":{"In":[0,153],"this":[1],"paper,":[2],"we":[3,29,51],"aim":[4],"to":[5,42,94],"explore":[6],"the":[7,22,31,104,134,177,182,187],"design":[8],"of":[9,49,92,102,118,146,163,197],"low-latency":[10,32],"authenticated":[11,56],"encryption":[12,57,142],"schemes":[13],"particularly":[14],"for":[15,149,176],"memory":[16],"encryption,":[17],"with":[18,38,59,156],"a":[19,54,74,80,90,150,195],"focus":[20],"on":[21],"temporal":[23],"uniqueness":[24],"property.":[25],"To":[26],"achieve":[27,126,161],"this,":[28],"present":[30],"Pseudo-Random":[33],"Function":[34],"(PRF)":[35],"called":[36],"Twinkle":[37],"an":[39,141],"output":[40],"up":[41],"1152":[43],"bits.":[44,96],"Leveraging":[45],"only":[46],"one":[47],"block":[48],"Twinkle,":[50],"developed":[52],"Twinkle-AE,":[53],"specialized":[55],"scheme":[58,158,185],"six":[60],"variants":[61],"covering":[62],"different":[63],"cache":[64,151,179],"line":[65],"sizes":[66],"and":[67,83,88,106,143,159,166],"security":[68,100,129],"requirements.":[69],"We":[70,97],"also":[71,173],"propose":[72],"Twinkle-PA,":[73,186],"pointer":[75,82,183],"authentication":[76,144,184],"algorithm,":[77],"which":[78],"takes":[79],"64-bit":[81,84],"context":[85],"as":[86],"input":[87],"outputs":[89],"tag":[91],"1":[93],"32":[95],"conducted":[98],"thorough":[99],"evaluations":[101],"both":[103],"PRFs":[105],"these":[107,123],"schemes,":[108],"examining":[109],"their":[110,127],"robustness":[111],"against":[112],"various":[113],"common":[114],"attacks.":[115],"The":[116],"results":[117],"our":[119],"cryptanalysis":[120],"indicate":[121],"that":[122,138],"designs":[124],"successfully":[125],"targeted":[128],"objectives.":[130],"Hardware":[131],"implementations":[132],"using":[133],"FreePDK45nm":[135],"library":[136],"show":[137],"Twinkle-AE":[139,171],"achieves":[140],"latency":[145,188,196],"3.83":[147],"ns":[148,165],"line.":[152,180],"comparison,":[154],"AES-CTR":[155],"WC-MAC":[157],"Ascon-128a":[160],"latencies":[162],"9.78":[164],"27.30":[167],"ns,":[168,191],"respectively.":[169],"Moreover,":[170],"is":[172,189],"most":[174],"area-effective":[175],"1024-bit":[178],"For":[181],"2.04":[190],"while":[192],"QARMA-64-sigma0":[193],"has":[194],"5.57":[198],"ns.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
