Results 11 to 20 of about 9,006 (193)
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family of tweakable block ciphers, which was presented at CRYPTO 2016, as the underlying
Christof Beierle +8 more
doaj +3 more sources
Key Committing Attacks against AES-based AEAD Schemes
Recently, there has been a surge of interest in the security of authenticated encryption with associated data (AEAD) within the context of key commitment frameworks.
Patrick Derbez +4 more
doaj +2 more sources
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation
Lightweight cryptography in computationally constrained devices is actively studied. In contrast to advances of lightweight blockcipher in the last decade, lightweight mode of operation is seemingly not so mature, yet it has large impact in performance ...
Yusuke Naito +3 more
doaj +3 more sources
Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD
Pseudo-Random Injections (PRIs) have been used in several applications in symmetric-key cryptography, such as in the idealization of Authenticated Encryption with Associated Data (AEAD) schemes, building robust AEAD, and, recently, in converting a ...
Mustafa Khairallah
doaj +3 more sources
TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features: (i) It offers full leakage-resistance, that is, it limits the exploitability of physical ...
Francesco Berti +4 more
doaj +4 more sources
Context-Committing Security of Leveled Leakage-Resilient AEAD
During recent years, research on authenticated encryption has been thriving through two highly active and practically motivated research directions: provable leakage resilience and key- or context-commitment security.
Chandranan Dhar +5 more
doaj +3 more sources
Lightweight AEAD and Hashing using the Sparkle Permutation Family [PDF]
We introduce the Sparkle family of permutations operating on 256, 384 and 512 bits. These are combined with the Beetle mode to construct a family of authenticated ciphers, Schwaemm, with security levels ranging from 120 to 250 bits.
Christof Beierle +7 more
doaj +4 more sources
The dynamics of vegetation diversity and biomass under traditional grazing in Ethiopia's Somali rangeland. [PDF]
This study explores the impact of different grazing management practices on vegetation attributes in the Somali pastoral ecosystem of Ethiopia. It examines herbaceous species diversity, composition, growth forms (grass vs. forbs), life forms (annuals vs.
Gebremedhn HH +5 more
europepmc +2 more sources
Depth-Optimized Quantum Circuits for ASCON: AEAD and HASH
Quantum computing advancements pose security challenges for cryptography. Specifically, Grover’s search algorithm affects the reduction in the search complexity of symmetric-key encryption and hash functions. Recent efforts have been made to estimate the
Yujin Oh +3 more
doaj +2 more sources
Identification of a novel caspase cleavage motif AEAD. [PDF]
Infections of many viruses induce caspase activation to regulate multiple cellular pathways, including programmed cell death, immune signaling and etc. Characterizations of caspase cleavage sites and substrates are important for understanding the regulation mechanisms of caspase activation.
Fang Y, Gong Z, You M, Peng K.
europepmc +3 more sources

