Review Article

[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices

Table 3

Authenticated encryption algorithms security comparison.

AlgorithmProvable confidentialityProvable authenticityNonce misuse resistanceSide channel attacks

AES-GCM [142]××Cache attack [143], Fault attack [70]
ACORN_v3 [144]×Fault attack [132]
ASCON_v1.2 [145]××
AES-CLOC [112]×Fault attack [146]
JOLTIK [147]×
PRIMATEs [148]×
SCREAM [149]×
SILC-AES [150]××
SILC-LED [150]××
AEGIS [151]××××
COLM [152]×
DeoxysI [153]××
DeoxysII [153]×
OCB [102]×
NORX [154]××
AES-JAMBU [155]×××
Tiaoxin [156]×××Fault attack [157]
AEZ [158]×Fault attack [129]
Ketje_v2 [159]××
Keyak [160]××
MORUS_v2 [161]××××