Review Article

[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices

Table 4

Characteristics of authenticated encryption candidates, v means variable.

AlgorithmMessageKeyNonceTagOnlineParallel (E/D)Inverse freeIntermediate tagAEAD

AES-GCM12812896128√/×××
ACORN128128128128√/√×
ASCON128128128128×/××
CLOC1281289664×/××
JOLTIK1281283264√/√××
PRIMATEs80808080×/××
120120120120×/××
SCREAM12812896128√/√×
SILC-AES12812864128×/√×
96
112
Aegis128128128128√/××
256256256128√/××
COLM12812864128√/√
DeoxysIV12864128√/√××
DeoxysIIV128120128√/√××
OCB12812812864√/√××
NORXV963296√/√×
SILC-LED64804832×/√×
AES-JAMBU1281286464×/××
Tiaoxin128128128128√/√×
AEZV384128128×√/√×
Ketje128128128128×/×
KeyakV288V128√/×
MORUS128128128128×/××