Results 241 to 250 of about 29,312 (265)
Some of the next articles are maybe not open access.

Authentication by Encrypted Negative Password

IEEE Transactions on Information Forensics and Security, 2019
Secure password storage is a vital aspect in systems based on password authentication, which is still the most widely used authentication technique, despite some security flaws. In this paper, we propose a password authentication framework that is designed for secure password storage and could be easily integrated into existing authentication systems ...
Wenjian Luo   +3 more
openaire   +1 more source

Authenticated encryption for FPGA bitstreams

Proceedings of the 19th ACM/SIGDA international symposium on Field programmable gate arrays, 2011
FPGA bitstream encryption blocks theft of the design in the FPGA bitstream by preventing unauthorized copy and reverse engineering. By itself, encryption does not protect against tampering with the bitstream, so without additional capabilities, bitstream encryption cannot prevent the FPGA from executing an unauthorized bitstream.
Stephen Trimberger   +2 more
openaire   +1 more source

Heterogeneous Deniable Authenticated Encryption Protocol

2020
Deniable authenticated encryption can achieve confidentiality and deniable authentication in a logical single step. Such a cryptographic primitive simplifies the design of cryptographic scheme and reduces the cost of computation and communication. In this paper, we propose a heterogeneous deniable authenticated encryption scheme called HDAE.
Chunhua Jin   +4 more
openaire   +1 more source

Field Encryption and Authentication

1984
Database encryption and authentication at the field level is attractive because it allows projections to be performed and individual data elements decrypted or authenticated. But field based protection is not usually recommended for security reasons: using encryption to hide individual data elements is vulnerable to ciphertext searching; using ...
openaire   +1 more source

Committing Authenticated Encryption

2023
Krämer, Juliane   +2 more
openaire   +1 more source

On Committing Authenticated-Encryption

2022
John Chan, Phillip Rogaway
openaire   +1 more source

Lightweight Authenticated Encryption for FPGAs

2016
Traditionally, authenticated encryption was achieved by using two seperate algorithms for encryption and authentication. Recently, modes that combine encryption and authentication together are being proposed. This feature is especially beneficial in case of hardware implementations, as it allows for a substantial decrease in the circuit area and power ...
openaire   +1 more source

Cookies, Authentication, Authorization, and Encryption

2002
If you are like me, an author having complete control of your Web site gives you the willies. Well, after this chapter, you can rest a little more easily as you start securing CMS.NET.
openaire   +1 more source

Broadcast Authentication and Broadcast Encryption

2014
Broadcast authentication schemes that employ only symmetric PRFs include certificates-based schemes like one-time-signatures (OTS), and timed efficient stream loss tolerant authentication (TESLA), and identity-based schemes based on probabilistic subset allocation.
openaire   +1 more source

Home - About - Disclaimer - Privacy