Results 31 to 40 of about 9,006 (193)

[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices

open access: yesWireless Communications and Mobile Computing, Volume 2023, Issue 1, 2023., 2023
Internet of Things (IoT) is a promising technology for creating smart environments, smart systems, and smart services. Since security is a fundamental requirement of IoT platforms, solutions that can provide both encryption and authenticity simultaneously have recently attracted much attention from academia and industry. This article analyses in detail
Zainab AlJabri   +3 more
wiley   +1 more source

A Chaos-Based Authenticated Cipher with Associated Data [PDF]

open access: yes, 2017
In recent years, there has been a rising interest in authenticated encryptionwith associated data (AEAD)which combines encryption and authentication into a unified scheme.
Je, Sen Teh, Samsudin, Azman
core   +3 more sources

Matching attacks on Romulus‐M

open access: yesIET Information Security, Volume 16, Issue 6, Page 459-469, November 2022., 2022
Abstract This paper considers a problem of identifying matching attacks against Romulus‐M, one of the 10 finalists of National Institute of Standards and Technology Lightweight Cryptography standardisation project. Romulus‐M is provably secure, that is, there is a theorem statement showing the upper bound on the success probability of attacking the ...
Makoto Habu   +2 more
wiley   +1 more source

Gene Structure, cDNA Sequence, and mRNA Distribution [PDF]

open access: yes, 1994
The rat HNF-3 (hepatocyte nuclear factor 3) gene family encodes three transcription factors known to be important in the regulation of gene expression in liver and lung.
Hiemisch, Holger   +3 more
core   +1 more source

Beyond full‐bit secure authenticated encryption without input‐length limitation

open access: yesIET Information Security, Volume 16, Issue 4, Page 253-261, July 2022., 2022
Abstract The security bound is an important evaluation criterion in an authenticated encryption (AE) scheme. Many AE schemes that are widely used have birthday‐bound security, which means that the scheme has b/2‐bit security, where b is the block size of the underlying primitive.
Akiko Inoue
wiley   +1 more source

Evidence for a nuclear compartment of transcription and splicing located at chromosome domain boundaries [PDF]

open access: yes, 1993
The nuclear topography of splicing snRNPs, mRNA transcripts and chromosome domains in various mammalian cell types are described. The visualization of splicing snRNPs, defined by the Sm antigen, and coiled bodies, revealed distinctly different ...
A Monneron   +64 more
core   +1 more source

Energy Analysis of Lightweight AEAD Circuits [PDF]

open access: yes, 2020
The selection criteria for NIST’s Lightweight Crypto Standardization (LWC) have been slowly shifting towards the lightweight efficiency of designs, given that a large number of candidates already establish their security claims on conservative, well-studied paradigms.
Andrea Caforio   +2 more
openaire   +1 more source

Security Analysis of Shadowsocks(R) Protocol

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Shadowsocks(R) is a proxy software based on Socks5, which is the collective name of shadowsocks and shadowsocksR. Shadowsocks(R) is a private protocol without a handshake negotiation mechanism. Peng broke the confidentiality of shadowsocks by exploiting vulnerability in the shadowsocks protocol and decrypted the shadowsocks packets encrypted with none ...
Qingbing Ji   +4 more
wiley   +1 more source

TEE‐Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM‐Based Low‐Power IoT Devices

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Trusted execution environments (TEEs) are on the rise in devices all around us ranging from large‐scale cloud‐based solutions to resource‐constrained embedded devices. With the introduction of ARM TrustZone‐M, hardware‐assisted trusted execution is now supported in IoT nodes.
Anum Khurshid   +4 more
wiley   +1 more source

Interaction of the 89K murine cytomegalovirus immediate-early protein with core histones [PDF]

open access: yes, 1988
The conditions that permit the interaction of immediate-early proteins of murine cytornegalovirus (MCMV) with DNA were studied. Chromatography of extracts from infected cells on MCMV DNA cellulose and calf thymus DNA cellulose showed that pp89, the ...
Alberts   +32 more
core   +1 more source

Home - About - Disclaimer - Privacy