Research Article
Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN
Table 1
Security results for different authenticated encryption schemes under the assumption that is IND-CPA secure and that is SUF-CMA secure, retrieved from [12]. The notion of IND-CPA security for is used since it is the weakest security notion (compared with IND-CCA), yet it is sufficient to achieve IND-CCA security under .
|