Data Attack Detection and Command Authentication via Cyber-Physical Comodeling

In this article, the authors study the problem of efficient authenticated encryption algorithms for use in embedded devices. In particular, they describe the ongoing Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR), and compare the different candidates of the competition with respect to a variety of metrics of… CONTINUE READING