International Association for Cryptologic Research

Ph.D. Database

The aim of the IACR Ph.D. database is twofold. On the first hand, we want to offer an overview of Ph.D. already completed in the domain of cryptology. Where possible, this should also include a subject classification, an abstract, and access to the full text. On the second hand, it deals with Ph.D. subjects currently under investigation. This way, we provide a timely map of contemporary research in cryptology. All entries or changes need to be approved by an editor. You can contact them via phds (at)


Marcos Antonio Simplicio Junior (#266)
Name Marcos Antonio Simplicio Junior
Personal Homepage
Topic of his/her doctorate. Message Authentication Algorithms for Wireless Sensor Networks
Category secret-key cryptography
Keywords message authentication codes, constrained platforms, Wireless Sensor Networks
Ph.D. Supervisor(s) Paulo S. L. M. Barreto
Year of completion 2010
Abstract Security is an important concern in any modern network. However, networks that are highly dependent on constrained devices (such as sensors, tokens and smart cards) impose a difficult challenge: their reduced availability of memory, processing power and (specially) energy hinders the deployment of many modern cryptographic algorithms known to be secure. This inconvenience affects not only the deployment of symmetric ciphers, which provide data confidentiality, but also Message Authentication Codes (MACs), used to attest the messages' integrity and authenticity. Due to the existence of dedicated block ciphers whose performance and security are adequate for use in resource-constrained scenarios (e.g., the Curupira-2), the focus of this document is on the design and analysis of message authentication algorithms. Our goal is to develop a secure and lightweight solution for deployment on resource constrained scenarios, with especial focus on Wireless Sensor Networks (WSNs). Marvin is the name of the MAC algorithm proposed in this document. Marvin adopts the Alred structure, allowing it to reuse parts of an underlying block cipher machinery; as a result, Marvin's implementation builds on the cipher's efficiency and introduces little impact in terms of memory occupation. Moreover, this algorithm presents a flexible and highly parallelizable structure, allowing many implementation optimizations depending on the resources available on the target platform. Marvin can be used not only as an authentication-only function, but also in an Authenticated-Encryption with Associated Data (AEAD) scheme, combining authentication and encryption. In this document, we define a new AEAD proposal called LetterSoup, which is based on the LFSRC (Linear Feedback Shift Register Counter) mode of operation and builds on Marvin. % Together with the specification of both algorithms, we provide a detailed security analysis and evaluate their performance in some representative scenarios.
E-Mail Address mjunior (at)
Last Change 2011-02-24 12:01:59
To provide an update on this entry, please click .

Marcos Antonio Simplicio Junior's Students

Ewerton Rodrigues Andrade - Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs (cryptographic protocols)

Contact: phds (at)

[ IACR home page ] [ IACR PhDs page ] © IACR