Results 21 to 30 of about 370,613 (347)
Quantum Half and Full Spinning Operator-Based Nonlinear Confusion Component
The structure of a substitution box (S-box) is one of the principal ideas of the modern encryption techniques. The security of a modern encryption algorithm highly depends on its nonlinear confusion component.
Abdullah Alghafis
doaj +1 more source
As a multireceiver variant of public key authenticated encryption with keyword search (PAEKS), broadcast authenticated encryption with keyword search (BAEKS) was proposed by Liu et al. (ACISP 2021).
Keita Emura
doaj +1 more source
Authenticated encryption mode with blocks skipping
Block symmetric ciphers are one of the most important components of modern information security systems. At the same time, in addition to the structure of the applied block symmetric cipher, the cryptographic strength and performance of the information ...
A. V. Sokolov, D. A. Isakov
doaj +1 more source
AEUR: authenticated encryption algorithm design based on uBlock round function
In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR was designed.Firstly, based on the uBlock round function,
Yatao YANG +3 more
doaj +2 more sources
Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
Real-world applications of authenticated encryption often require the encryption to be computable online, e.g. to compute the ith block of ciphertext after having processed the first i blocks of plaintext.
Guillaume Endignoux, Damian Vizár
doaj +1 more source
Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors
We revisit Unterstein et al.’s leakage-resilient authenticated encryption scheme from CHES 2020. Its main goal is to enable secure software updates by leveraging unprotected (e.g., AES, SHA256) coprocessors available on low-end microcontrollers.
Olivier Bronchain +3 more
semanticscholar +1 more source
Publicly verifiable authenticated encryption
A new authenticated encryption scheme with public verifiability is presented. The new scheme requires less computational costs and communication overhead than the conventional signature-then-encryption approaches. Furthermore the message is not divulged during the public verification.
Changshe Ma, Kefei Chen
openaire +2 more sources
Validating a Web Service Security Abstraction by Typing [PDF]
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core +2 more sources
The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits
The bit-sliding paper of Jean et al. (CHES 2017) showed that the smallest-size circuit for SPN based block ciphers such as AES, SKINNY and PRESENT can be achieved via bit-serial implementations.
Fatih Balli +2 more
doaj +3 more sources
Options for Securing RTP Sessions [PDF]
The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality ...
Perkins, C., Westerlund, M.
core +2 more sources

