P. Rogaway, Evaluation of Some Blockcipher Modes of Operation, 2011.

G. Hanaoka, Y. Zheng, and H. Imai, LITESET: A light-weight secure electronic transaction protocol, LNCS, Information Security and Privacy, vol.1438, pp.215-226, 2006.
DOI : 10.1007/BFb0053735

H. K. Kim and T. H. Kim, Design on Mobile Secure Electronic Transaction Protocol with Component Based Development, LNCS, ICCSA, vol.3043, pp.461-470, 2004.
DOI : 10.1007/978-3-540-24707-4_57

L. C. Cao, Improving Security of SET Protocol Based on ECC, LNCS, WISM, vol.5, issue.1, pp.234-241, 2011.
DOI : 10.1007/3-540-44499-8_1

. M. Lorenz, Authentication and Transaction Security in E-business The Future of Identity in the Information Society, pp.175-197, 2008.

D. V. Bailey, J. Brainard, S. Rohde, and C. Paar, Wireless Authentication and Transaction-Confirmation Token, ICETE, vol.1, issue.11, pp.186-198, 2011.
DOI : 10.1007/11889663_1

P. Subpratatsavee and P. Kuacharoen, Transaction Authentication Using HMAC-Based One-Time Password and QR Code, Computer Science and its Applications, vol.330, pp.93-98
DOI : 10.1007/978-3-662-45402-2_14

L. Zhang1, W. Wu, and P. Wang, Extended Models for Message Authentication, LNCS, ICISC, vol.7, issue.4, pp.286-301, 2008.
DOI : 10.1007/3-540-45439-X_17

L. Atzori, A. Iera, and G. Morabito, The Internet of Things: A survey, Computer Networks, vol.54, issue.15, p.27872805, 2010.
DOI : 10.1016/j.comnet.2010.05.010

Z. Zhou1, K. F. Tsang, Z. Zhao, and W. Gaalou, Data intelligence on the Internet of Things, Personal and Ubiquitous Computing, vol.20, issue.3, 2016.
DOI : 10.1007/s00779-016-0912-1

P. Coppola, V. D. Mea, L. D. Gaspero, R. Lomuscio, D. Mischis et al., AI Techniques in a Context-Aware Ubiquitous Environment, Computer Communications and Networks, pp.157-180, 2009.
DOI : 10.1007/978-1-84882-599-4_8

K. Zhao and L. Ge, A Survey on the Internet of Things Security, 2013 Ninth International Conference on Computational Intelligence and Security, pp.663-667, 2013.
DOI : 10.1109/CIS.2013.145

B. Mennink, Embedded Security for Internet of Things, IEEE explore NCETACS, pp.978-979, 2011.

A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, Internet of Things for Smart Cities, IEEE Internet of Things Journal, vol.1, issue.1, pp.22-32, 2014.
DOI : 10.1109/JIOT.2014.2306328

O. Ozen and M. Stam, Another Glance at Double-Length Hashing, LNCS, Cryptography and Coding, vol.5291, pp.176-201, 2009.

E. Andreeva, A. Bogdanov, A. Luykx, B. Mennink, E. Tischhauser et al., Parallelizable and Authenticated Online Ciphers, LNCS, Asiacrypt, vol.8269, pp.424-443, 2013.
DOI : 10.1007/978-3-642-42033-7_22

URL : http://orbit.dtu.dk/en/publications/parallelizable-and-authenticated-online-ciphers(dc863566-c2a2-4e38-85e4-f060c8a4d5d4).html

E. Andreeva, B. Bilgin, A. Bogdanov, A. Luykx, B. Mennink et al., APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography, LNCS, FSE, vol.8540, pp.168-186, 2014.
DOI : 10.1007/978-3-662-46706-0_9

F. Abed, S. Fluhrer, C. Forler, E. List, S. Lucks et al., Pipelineable Online Encryption, LNCS, FSE, vol.8540, pp.205-223, 2015.
DOI : 10.1007/978-3-662-46706-0_11

URL : http://eprint.iacr.org/2014/297.pdf

E. Fleischmann, C. Forler, and S. Lucks, McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes, LNCS, FSE, vol.7549, pp.196-215, 2012.
DOI : 10.1007/978-3-642-34047-5_12

P. Rogaway, Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC, LNCS, Asiacrypt, vol.3329, pp.16-31, 2004.
DOI : 10.1007/978-3-540-30539-2_2

URL : http://www.cs.ucdavis.edu/~rogaway/papers/offsets.ps

K. Yasuda, A New Variant of PMAC: Beyond the Birthday Bound, LNCS, Crypto, vol.6841, pp.596-609, 2011.
DOI : 10.1007/978-3-642-22792-9_34

Y. Naito, Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher, LNCS, Provsec, vol.9451, pp.167-182, 2015.
DOI : 10.1007/978-3-319-26059-4_9

A. K. Yau, K. G. Paterson, and C. J. Mitchell, Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs, LNCS, FSE LNCS, vol.3557, p.299317, 2005.
DOI : 10.1007/11502760_20

URL : http://www.ftc.gov/os/comments/prescreenedoptout/OL-100015.pdf

T. Lee, J. Kim, C. Lee, J. Sung, S. Lee et al., Padding Oracle Attacks on Multiple Modes of Operation, LNCS, ICISC LNCS, vol.3506, p.343351, 2004.
DOI : 10.1007/11496618_25

G. Kenneth and P. A. Yau, Padding Oracle Attacks on the ISO CBC Mode Encryption Standard, LNCS, CT-RSA LNCS 2964, pp.305-323, 2004.

J. A. Black, P. Rogaway, and T. Shrimpton, Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV, LNCS, CRYPTO, vol.2442, pp.320-335, 2002.
DOI : 10.1007/3-540-45708-9_21

J. A. Black, P. Rogaway, T. Shrimpton, and M. Stam, An Analysis of the Blockcipher-Based Hash??Functions??from??PGV, Journal of Cryptology, vol.28, issue.4, pp.519-545, 2010.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

A. Miyaji and R. Mazumder, A New (n, 2n) Double Block Length Hash Function Based on Single Key Scheduling, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, pp.564-570, 2015.
DOI : 10.1109/AINA.2015.237

S. Hirose, K. Ideguchi, H. Kuwakado, T. Owada, B. Preneel et al., A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW The 128-bit Blockcipher CLEFIA, LNCS, ICISC Extended Abstract, vol.6829, pp.151-168, 2010.

H. Yoshida-t, I. Iec-jtc-1, T. , and I. Iec, On the standardization of cryptographic application techniques for IoT devices in ITU techniques for IoT devices in ITU, p.2015

M. Bellare and P. Rogaway, The Security of Triple Encryption and a Framework??for??Code-Based??Game-Playing??Proofs, LNCS, EUROCRYPT, vol.28, issue.4, pp.409-426, 2006.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

V. T. Hoang, R. Reyhanitabar, P. Rogaway, and V. Damian, Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance, LNCS, Crypto, vol.9215, pp.493-517, 2015.
DOI : 10.1007/978-3-662-47989-6_24

URL : http://web.cs.ucdavis.edu/%7Erogaway/papers/oae.pdf

T. Iwata, K. Minematsu, J. Guo, and S. Morioka, CLOC: Authenticated Encryption for Short Input, LNCS, FSE, vol.8540, pp.149-167, 2015.
DOI : 10.1007/978-3-662-46706-0_8

URL : https://eprint.iacr.org/2014/157.pdf

T. Iwata, K. Minematsu, J. Guo, S. Morioka, and E. Kobayashi, SILC: SImple Lightweight CFB, DIAC Competitions

K. Minematsu, Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions, LNCS, Eurocrypt, vol.8441, pp.275-292, 2014.
DOI : 10.1007/978-3-642-55220-5_16

URL : https://eprint.iacr.org/2013/628.pdf

D. Chang, S. R. Manjunath, and S. K. Sanadhya, PPAE: Practical Parazoa Authenticated Encryption Family, LNCS, Provsec, vol.9451, pp.198-211, 2015.
DOI : 10.1007/978-3-319-26059-4_11