Results 11 to 20 of about 370,613 (347)

An Improved Authenticated Encryption Scheme

open access: diamondIEICE Transactions on Information and Systems, 2011
Authenticated encryption schemes are very useful for private and authenticated communication. In 2010, Rasslan and Youssef showed that the Hwang et al.'s authenticated encryption scheme is not secure by presenting a message forgery attack. However, Rasslan and Youssef did not give how to solve the security issue.
Fagen LI, Jiang DENG, Tsuyoshi TAKAGI
openaire   +3 more sources

Ascon v1.2: Lightweight Authenticated Encryption and Hashing

open access: yesJournal of Cryptology, 2021
Authenticated encryption satisfies the basic need for authenticity and confidentiality in our information infrastructure. In this paper, we provide the specification of Ascon-128 and Ascon-128a.
Christoph Dobraunig   +3 more
semanticscholar   +1 more source

ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data

open access: yesIEEE Transactions on Information Forensics and Security, 2023
The widespread adoption of cloud computing and the exponential growth of data highlight the need for secure data sharing and querying. Attribute-based keyword search (ABKS) has emerged as an efficient means of searching encrypted data stored in the cloud.
Fucai Luo   +3 more
semanticscholar   +1 more source

Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms [PDF]

open access: yesQuantum Information Processing, 2021
The classic forgery attacks on COPA, AES-COPA and Marble authenticated encryption algorithms need to query about 2n/2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy ...
Yinsong Xu, Wenjie Liu, Wenbin Yu
semanticscholar   +1 more source

Fault attacks on authenticated encryption modes for GIFT

open access: yesIET Information Security, 2022
There are several authenticated encryption modes for block cipher GIFT in the NIST lightweight cryptography standardisation process. In this study, the authors research on the fault attacks on this kind of authenticated encryption modes and mainly ...
Shuai Liu, Jie Guan, Bin Hu
doaj   +1 more source

Research and design of authenticated encryption algorithm based on AES round function

open access: yes网络与信息安全学报, 2020
The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time, and has extensive research and application prospects in the field of information security. With the mixed integer linear programming
GAO Guoqiang, LI Zichen
doaj   +3 more sources

Password-authenticated searchable encryption [PDF]

open access: yesInternational Journal of Information Security, 2020
AbstractWe introducePassword Authenticated Searchable Encryption (PASE), a novel searchable encryption scheme where a single human-memorizable password can be used to outsource (encrypted) data with associated keywords to a group of servers and later retrieve this data through the encrypted keyword search procedure.
Liqun Chen   +3 more
openaire   +1 more source

ChaCha20-Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3

open access: yesCryptogr., 2022
Transport Layer Security (TLS) provides a secure channel for end-to-end communications in computer networks. The ChaCha20–Poly1305 cipher suite is introduced in TLS 1.3, mitigating the sidechannel attacks in the cipher suites based on the Advanced ...
Ronaldo Serrano   +4 more
semanticscholar   +1 more source

Authenticated Encryption Scheme of Self-synchronous-like ZUC Algorithm [PDF]

open access: yesJisuanji kexue, 2023
Aiming at the security,efficiency and lightweight requirements of authentication encryption of ZUC algorithm,this paper proposes a kind of self-synchronous-like ZUC algorithm for associated data authentication encryption scheme ZUCAE.By improving the ...
XU Rui, PENG Changgen, XU Dequan
doaj   +1 more source

A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing

open access: yesSecurity and Communication Networks, 2022
Cloud computing can provide users with sufficient computing resources, storage, and bandwidth to meet their needs. Data security and privacy protection are among the new threats faced by users.
Haorui Du   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy