Results 1 to 10 of about 9,006 (193)
Implementing Grover’s on AES-based AEAD schemes [PDF]
Extensive research is currently underway to determine the security of existing ciphers in light of the advancements in quantum computing. Against symmetric key cryptography, Grover’s search algorithm is a prominent attack, capable of reducing search ...
Surajit Mandal +4 more
doaj +4 more sources
The Authenticated Encryption with Associated Data (AEAD) primitive, which integrates confidentiality and integrity services under a single roof, found wide-spread adoption in industry and became indispensable in practical protocol design.
Bertram Poettering, Paul Rösler
doaj +3 more sources
Exploring Integrity of AEADs with Faults: Definitions and Constructions
Implementation-based attacks are major concerns for modern cryptography. For symmetric-key cryptography, a significant amount of exploration has taken place in this regard for primitives such as block ciphers.
Sayandeep Saha +2 more
doaj +3 more sources
A Lightweight Authentication and Key Distribution Protocol for XR Glasses Using PUF and Cloud-Assisted ECC [PDF]
The rapid convergence of artificial intelligence (AI), cloud computing, and 5G communication has positioned extended reality (XR) as a core technology bridging the physical and virtual worlds.
Wukjae Cha +4 more
doaj +2 more sources
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
Transport Layer Security (TLS) provides a secure channel for end-to-end communications in computer networks. The ChaCha20–Poly1305 cipher suite is introduced in TLS 1.3, mitigating the sidechannel attacks in the cipher suites based on the Advanced ...
Ronaldo Serrano +4 more
doaj +1 more source
Electric anomaly detection (EAD) has been widely used for target detection in underwater areas. However, due to the high path loss in the water, an electric anomaly is usually submerged in environmental noise and interference, which affects the detection
Yidong Xu +6 more
doaj +1 more source
Key Committing Security of AEZ and More
For an Authenticated Encryption with Associated Data (AEAD) scheme, the key committing security refers to the security notion of whether the adversary can produce a pair of distinct input tuples, including the key, that result in the same output.
Yu Long Chen +9 more
doaj +1 more source
REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System
The phenomenal growth of smartphones and wearable devices has begun crowd-sourcing applications for the Internet of Things (IoT). E-healthcare is considered the essential service for crowd-sourcing IoT applications that help remote access or storage ...
Muhammad Tanveer +5 more
doaj +1 more source
The Effect of Interfered Teaching Style in Acquiring and Retention Basketball Skills (dribbling and setting shoots [PDF]
This research aims to know the effect of using two interfered teaching styles (training ,command) in gaining basketball skills(dribbling and setting shoots) , Samples consist of (40) student of the first stage in the collage of Sport Education in ...
Aead SHeet, Ziyad salim
doaj +1 more source
GLUSTERING ANALYSIS OF MORPHOLOGICAL CHARACTERISTICS OF SIX GENERA OF BRUCHIDAE FAMILY: COLEOPTERA ORDER IN IRAQ [PDF]
The research tackles the taxonomy of six insects genera:Caryedon, Spermophagus, Bruchus, Bruchidius, Callosobruchus and Acanthoselides that belong to Bruchidae family :Coleoptera order which are recorded in Iraq depending on morphological characteristics
Aead Haj Ismail
doaj +1 more source

