Results 1 to 10 of about 29,404 (289)

How to reuse a one-time pad and other notes on authentication, encryption and protection of quantum information [PDF]

open access: yes, 2005
Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases.
Horodecki, Michal, Oppenheim, Jonathan
core   +2 more sources

Context-Committing Authenticated Encryptions Using Tweakable Stream Cipher

open access: yesIEEE Access
Committing security of authenticated encryption schemes is an emerging area and an active field of research and is highly motivated by real-world scenarios.
Donghoon Chang, Munawar Hasan
doaj   +1 more source

Effective Caching for the Secure Content Distribution in Information-Centric Networking

open access: yes, 2018
The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective ...
Bilal, Muhammad   +2 more
core   +1 more source

A security architecture for personal networks [PDF]

open access: yes, 2006
Personal Network (PN) is a new concept utilizing pervasive computing to meet the needs of the user. As PNs edge closer towards reality, security becomes an important concern since any vulnerability in the system will limit its practical use.
Heemstra de Groot, Sonia M.   +1 more
core   +2 more sources

Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
The security of Internet of Things (IoT) devices relies on fundamental concepts such as cryptographically protected firmware updates. In this context attackers usually have physical access to a device and therefore side-channel attacks have to be ...
Florian Unterstein   +5 more
doaj   +1 more source

High-level Cryptographic Abstractions

open access: yes, 2019
The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while ...
Chand, Saksham   +4 more
core   +1 more source

Image encryption system based on a nonlinear joint transform correlator for the simultaneous authentication of two users [PDF]

open access: yes, 2019
We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system.
Millán Garcia-Varela, M. Sagrario   +2 more
core   +2 more sources

Key Assignment Scheme with Authenticated Encryption

open access: yesIACR Transactions on Symmetric Cryptology, 2018
The Key Assignment Scheme (KAS) is a well-studied cryptographic primitive used for hierarchical access control (HAC) in a multilevel organisation where the classes of people with higher privileges can access files of those with lower ones.
Suyash Kandele, Souradyuti Paul
doaj   +1 more source

WAGE: An Authenticated Encryption with a Twist

open access: yesIACR Transactions on Symmetric Cryptology, 2020
This paper presents WAGE, a new lightweight sponge-based authenticated cipher whose underlying permutation is based on a 37-stage Galois NLFSR over F27.
Riham AlTawy   +3 more
doaj   +1 more source

Protecting FPGA bitstreams using authenticated encryption [PDF]

open access: yes2013 IEEE 11th International New Circuits and Systems Conference (NEWCAS), 2013
This paper describes low cost solution for bitstream security by adding authentication and encryption to the reconfiguration process using Authenticated Encryption (AE). Compact ASIC architecture for AE is presented: Counter with Cipher Block Chaining-Message Authentication Code (CCM).
Moussa Ali Abdellatif, Karim   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy