Publication:
Authenticated Encryption Schemes: A Systematic Review

dc.citedby4
dc.contributor.authorJimale M.A.en_US
dc.contributor.authorZ'Aba M.R.en_US
dc.contributor.authorKiah M.L.B.M.en_US
dc.contributor.authorIdris M.Y.I.en_US
dc.contributor.authorJamil N.en_US
dc.contributor.authorMohamad M.S.en_US
dc.contributor.authorRohmad M.S.en_US
dc.contributor.authorid57440872300en_US
dc.contributor.authorid24726154700en_US
dc.contributor.authorid24833455600en_US
dc.contributor.authorid7005361464en_US
dc.contributor.authorid36682671900en_US
dc.contributor.authorid36662779700en_US
dc.contributor.authorid24463710800en_US
dc.date.accessioned2023-05-29T09:41:50Z
dc.date.available2023-05-29T09:41:50Z
dc.date.issued2022
dc.descriptionCryptography; Efficiency; Authenticated encryption; CAESAR competition; Classification algorithm; Confidentiality; Integrity; Message authentication codes; NIST; NIST-LW competition; Security; Systematic; Authenticationen_US
dc.description.abstractAuthenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have been proposed to enhance the available schemes in terms of security, efficiency, and design and to implement new ideas. However, a comprehensive systematic literature review (SLR) of the topic has not been provided to the best of the authors' knowledge. This study fills this gap in the literature by proposing a framework for classifying AE schemes and highlighting past contributions to help researchers familiarize themselves with the current state and directions for future research in the area. This SLR covered AE schemes proposed from 2000 to 2020. A total of 217 articles, selected from eight sources, were categorized into independent schemes, CAESAR competition schemes, and NIST lightweight competition schemes. These schemes were then classified according to their design approaches, security-related properties, and functional features. Our analysis reveals that a significant outstanding challenge in AE is to balance security, efficiency, and the provision of desirable features. � 2013 IEEE.en_US
dc.description.natureFinalen_US
dc.identifier.doi10.1109/ACCESS.2022.3147201
dc.identifier.epage14766
dc.identifier.scopus2-s2.0-85124069455
dc.identifier.spage14739
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85124069455&doi=10.1109%2fACCESS.2022.3147201&partnerID=40&md5=8abd65288ce644a8a55ab8d2e49c7fd8
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/27266
dc.identifier.volume10
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relation.ispartofAll Open Access, Gold
dc.sourceScopus
dc.sourcetitleIEEE Access
dc.titleAuthenticated Encryption Schemes: A Systematic Reviewen_US
dc.typeReviewen_US
dspace.entity.typePublication
Files
Collections