Results 11 to 20 of about 29,404 (289)

Heterogeneous deniable authenticated encryption for location-based services. [PDF]

open access: yesPLoS ONE, 2021
The location-based services can provide users with the requested location information. But users also need to disclose their current location to the location-based service provider. Therefore, how to protect user's location privacy is a major concern. In
Chunhua Jin   +5 more
doaj   +2 more sources

S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme [PDF]

open access: yesSensors, 2020
IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the environment and transmit to a central server through the public Internet. Therefore, it
Muhammad Tanveer   +5 more
doaj   +2 more sources

ISAP – Towards Side-Channel Secure Authenticated Encryption

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to counteract such attacks are cryptographic schemes based on fresh re-keying. In settings of pre-shared
Christoph Dobraunig   +4 more
doaj   +3 more sources

Secure Fully Homomorphic Authenticated Encryption

open access: yesIEEE Access, 2021
Homomorphic authenticated encryption allows implicit computation on plaintexts using corresponding ciphertexts without losing privacy, and provides authenticity of the computation and the resultant plaintext of the computation when performing a ...
Jeongsu Kim, Aaram Yun
doaj   +1 more source

Fault attacks on authenticated encryption modes for GIFT

open access: yesIET Information Security, 2022
There are several authenticated encryption modes for block cipher GIFT in the NIST lightweight cryptography standardisation process. In this study, the authors research on the fault attacks on this kind of authenticated encryption modes and mainly ...
Shuai Liu, Jie Guan, Bin Hu
doaj   +1 more source

Research and design of authenticated encryption algorithm based on AES round function

open access: yes网络与信息安全学报, 2020
The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time, and has extensive research and application prospects in the field of information security. With the mixed integer linear programming
GAO Guoqiang, LI Zichen
doaj   +3 more sources

Password-authenticated searchable encryption [PDF]

open access: yesInternational Journal of Information Security, 2020
AbstractWe introducePassword Authenticated Searchable Encryption (PASE), a novel searchable encryption scheme where a single human-memorizable password can be used to outsource (encrypted) data with associated keywords to a group of servers and later retrieve this data through the encrypted keyword search procedure.
Liqun Chen   +3 more
openaire   +1 more source

Authenticated Encryption Scheme of Self-synchronous-like ZUC Algorithm [PDF]

open access: yesJisuanji kexue, 2023
Aiming at the security,efficiency and lightweight requirements of authentication encryption of ZUC algorithm,this paper proposes a kind of self-synchronous-like ZUC algorithm for associated data authentication encryption scheme ZUCAE.By improving the ...
XU Rui, PENG Changgen, XU Dequan
doaj   +1 more source

Authenticated Encryption Schemes: A Systematic Review

open access: yesIEEE Access, 2022
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000.
Mohamud Ahmed Jimale   +6 more
doaj   +1 more source

Quantum Half and Full Spinning Operator-Based Nonlinear Confusion Component

open access: yesIEEE Access, 2021
The structure of a substitution box (S-box) is one of the principal ideas of the modern encryption techniques. The security of a modern encryption algorithm highly depends on its nonlinear confusion component.
Abdullah Alghafis
doaj   +1 more source

Home - About - Disclaimer - Privacy