Results 1 to 10 of about 9,006 (193)

Implementing Grover’s on AES-based AEAD schemes [PDF]

open access: yesScientific Reports
Extensive research is currently underway to determine the security of existing ciphers in light of the advancements in quantum computing. Against symmetric key cryptography, Grover’s search algorithm is a prominent attack, capable of reducing search ...
Surajit Mandal   +4 more
doaj   +4 more sources

Combiners for AEAD

open access: yesIACR Transactions on Symmetric Cryptology, 2020
The Authenticated Encryption with Associated Data (AEAD) primitive, which integrates confidentiality and integrity services under a single roof, found wide-spread adoption in industry and became indispensable in practical protocol design.
Bertram Poettering, Paul Rösler
doaj   +3 more sources

Exploring Integrity of AEADs with Faults: Definitions and Constructions

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Implementation-based attacks are major concerns for modern cryptography. For symmetric-key cryptography, a significant amount of exploration has taken place in this regard for primitives such as block ciphers.
Sayandeep Saha   +2 more
doaj   +3 more sources

A Lightweight Authentication and Key Distribution Protocol for XR Glasses Using PUF and Cloud-Assisted ECC [PDF]

open access: yesSensors
The rapid convergence of artificial intelligence (AI), cloud computing, and 5G communication has positioned extended reality (XR) as a core technology bridging the physical and virtual worlds.
Wukjae Cha   +4 more
doaj   +2 more sources

ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3

open access: yesCryptography, 2022
Transport Layer Security (TLS) provides a secure channel for end-to-end communications in computer networks. The ChaCha20–Poly1305 cipher suite is introduced in TLS 1.3, mitigating the sidechannel attacks in the cipher suites based on the Advanced ...
Ronaldo Serrano   +4 more
doaj   +1 more source

Active Electric Anomaly Detection Method for Underwater Targets Based on the Orthonormal Basis Function

open access: yesJournal of Marine Science and Engineering, 2022
Electric anomaly detection (EAD) has been widely used for target detection in underwater areas. However, due to the high path loss in the water, an electric anomaly is usually submerged in environmental noise and interference, which affects the detection
Yidong Xu   +6 more
doaj   +1 more source

Key Committing Security of AEZ and More

open access: yesIACR Transactions on Symmetric Cryptology, 2023
For an Authenticated Encryption with Associated Data (AEAD) scheme, the key committing security refers to the security notion of whether the adversary can produce a pair of distinct input tuples, including the key, that result in the same output.
Yu Long Chen   +9 more
doaj   +1 more source

REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System

open access: yesIEEE Access, 2022
The phenomenal growth of smartphones and wearable devices has begun crowd-sourcing applications for the Internet of Things (IoT). E-healthcare is considered the essential service for crowd-sourcing IoT applications that help remote access or storage ...
Muhammad Tanveer   +5 more
doaj   +1 more source

The Effect of Interfered Teaching Style in Acquiring and Retention Basketball Skills (dribbling and setting shoots [PDF]

open access: yesمجلة الرافدين للعلوم الرياضية, 2008
This research aims to know the effect of using two interfered teaching styles (training ,command) in gaining basketball skills(dribbling and setting shoots) , Samples consist of (40) student of the first stage in the collage of Sport Education in ...
Aead SHeet, Ziyad salim
doaj   +1 more source

GLUSTERING ANALYSIS OF MORPHOLOGICAL CHARACTERISTICS OF SIX GENERA OF BRUCHIDAE FAMILY: COLEOPTERA ORDER IN IRAQ [PDF]

open access: yesMesopotamia Journal of Agriculture, 2018
The research tackles the taxonomy of six insects genera:Caryedon, Spermophagus, Bruchus, Bruchidius, Callosobruchus and Acanthoselides that belong to Bruchidae family :Coleoptera order which are recorded in Iraq depending on morphological characteristics
Aead Haj Ismail
doaj   +1 more source

Home - About - Disclaimer - Privacy