Results 1 to 10 of about 370,613 (347)

S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme [PDF]

open access: yesSensors, 2020
IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the environment and transmit to a central server through the public Internet. Therefore, it
Muhammad Tanveer   +5 more
doaj   +3 more sources

WAGE: An Authenticated Encryption with a Twist

open access: diamondIACR Transactions on Symmetric Cryptology, 2020
This paper presents WAGE, a new lightweight sponge-based authenticated cipher whose underlying permutation is based on a 37-stage Galois NLFSR over F27.
Riham AlTawy   +3 more
doaj   +4 more sources

Secure Fully Homomorphic Authenticated Encryption

open access: yesIEEE Access, 2021
Homomorphic authenticated encryption allows implicit computation on plaintexts using corresponding ciphertexts without losing privacy, and provides authenticity of the computation and the resultant plaintext of the computation when performing a ...
Jeongsu Kim, Aaram Yun
doaj   +2 more sources

Authenticated Encryption Schemes: A Systematic Review

open access: yesIEEE Access, 2022
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000.
Mohamud Ahmed Jimale   +6 more
doaj   +2 more sources

Heterogeneous deniable authenticated encryption for location-based services. [PDF]

open access: yesPLoS ONE, 2021
The location-based services can provide users with the requested location information. But users also need to disclose their current location to the location-based service provider. Therefore, how to protect user's location privacy is a major concern. In
Chunhua Jin   +5 more
doaj   +2 more sources

Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus

open access: yesIACR Transactions on Symmetric Cryptology, 2020
With the trend to connect more and more devices to the Internet, authenticated encryption has become a major backbone in securing the communication, not only between these devices and servers, but also the direct communication among these devices.
Tim Beyne   +3 more
doaj   +2 more sources

Indifferentiable Authenticated Encryption [PDF]

open access: green, 2018
We study Authenticated Encryption with Associated Data (AEAD) from the viewpoint of composition in arbitrary (single-stage) environments. We use the indifferentiability framework to formalize the intuition that a "good" AEAD scheme should have random ciphertexts subject to de-cryptability.
Barbosa, Manuel, Farshim, Pooya
openaire   +5 more sources

Authenticated Public Key Elliptic Curve Based on Deep Convolutional Neural Network for Cybersecurity Image Encryption Application [PDF]

open access: goldSensors, 2023
The demand for cybersecurity is growing to safeguard information flow and enhance data privacy. This essay suggests a novel authenticated public key elliptic curve based on a deep convolutional neural network (APK-EC-DCNN) for cybersecurity image ...
Esam A. A. Hagras   +3 more
doaj   +2 more sources

ISAP – Towards Side-Channel Secure Authenticated Encryption

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to counteract such attacks are cryptographic schemes based on fresh re-keying. In settings of pre-shared
Christoph Dobraunig   +4 more
doaj   +3 more sources

Key Assignment Scheme with Authenticated Encryption

open access: diamondIACR Transactions on Symmetric Cryptology, 2018
The Key Assignment Scheme (KAS) is a well-studied cryptographic primitive used for hierarchical access control (HAC) in a multilevel organisation where the classes of people with higher privileges can access files of those with lower ones.
Suyash Kandele, Souradyuti Paul
doaj   +3 more sources

Home - About - Disclaimer - Privacy