Results 31 to 40 of about 9,006 (193)
[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices
Internet of Things (IoT) is a promising technology for creating smart environments, smart systems, and smart services. Since security is a fundamental requirement of IoT platforms, solutions that can provide both encryption and authenticity simultaneously have recently attracted much attention from academia and industry. This article analyses in detail
Zainab AlJabri +3 more
wiley +1 more source
A Chaos-Based Authenticated Cipher with Associated Data [PDF]
In recent years, there has been a rising interest in authenticated encryptionwith associated data (AEAD)which combines encryption and authentication into a unified scheme.
Je, Sen Teh, Samsudin, Azman
core +3 more sources
Abstract This paper considers a problem of identifying matching attacks against Romulus‐M, one of the 10 finalists of National Institute of Standards and Technology Lightweight Cryptography standardisation project. Romulus‐M is provably secure, that is, there is a theorem statement showing the upper bound on the success probability of attacking the ...
Makoto Habu +2 more
wiley +1 more source
Gene Structure, cDNA Sequence, and mRNA Distribution [PDF]
The rat HNF-3 (hepatocyte nuclear factor 3) gene family encodes three transcription factors known to be important in the regulation of gene expression in liver and lung.
Hiemisch, Holger +3 more
core +1 more source
Beyond full‐bit secure authenticated encryption without input‐length limitation
Abstract The security bound is an important evaluation criterion in an authenticated encryption (AE) scheme. Many AE schemes that are widely used have birthday‐bound security, which means that the scheme has b/2‐bit security, where b is the block size of the underlying primitive.
Akiko Inoue
wiley +1 more source
Evidence for a nuclear compartment of transcription and splicing located at chromosome domain boundaries [PDF]
The nuclear topography of splicing snRNPs, mRNA transcripts and chromosome domains in various mammalian cell types are described. The visualization of splicing snRNPs, defined by the Sm antigen, and coiled bodies, revealed distinctly different ...
A Monneron +64 more
core +1 more source
Energy Analysis of Lightweight AEAD Circuits [PDF]
The selection criteria for NIST’s Lightweight Crypto Standardization (LWC) have been slowly shifting towards the lightweight efficiency of designs, given that a large number of candidates already establish their security claims on conservative, well-studied paradigms.
Andrea Caforio +2 more
openaire +1 more source
Security Analysis of Shadowsocks(R) Protocol
Shadowsocks(R) is a proxy software based on Socks5, which is the collective name of shadowsocks and shadowsocksR. Shadowsocks(R) is a private protocol without a handshake negotiation mechanism. Peng broke the confidentiality of shadowsocks by exploiting vulnerability in the shadowsocks protocol and decrypted the shadowsocks packets encrypted with none ...
Qingbing Ji +4 more
wiley +1 more source
Trusted execution environments (TEEs) are on the rise in devices all around us ranging from large‐scale cloud‐based solutions to resource‐constrained embedded devices. With the introduction of ARM TrustZone‐M, hardware‐assisted trusted execution is now supported in IoT nodes.
Anum Khurshid +4 more
wiley +1 more source
Interaction of the 89K murine cytomegalovirus immediate-early protein with core histones [PDF]
The conditions that permit the interaction of immediate-early proteins of murine cytornegalovirus (MCMV) with DNA were studied. Chromatography of extracts from infected cells on MCMV DNA cellulose and calf thymus DNA cellulose showed that pp89, the ...
Alberts +32 more
core +1 more source

