Results 21 to 30 of about 29,404 (289)

Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus

open access: yesIACR Transactions on Symmetric Cryptology, 2020
With the trend to connect more and more devices to the Internet, authenticated encryption has become a major backbone in securing the communication, not only between these devices and servers, but also the direct communication among these devices.
Tim Beyne   +3 more
doaj   +1 more source

Generic Construction of Fully Anonymous Broadcast Authenticated Encryption with Keyword Search with Adaptive Corruptions

open access: yesIET Information Security, 2023
As a multireceiver variant of public key authenticated encryption with keyword search (PAEKS), broadcast authenticated encryption with keyword search (BAEKS) was proposed by Liu et al. (ACISP 2021).
Keita Emura
doaj   +1 more source

Authenticated encryption mode with blocks skipping

open access: yesСистемный анализ и прикладная информатика, 2021
Block symmetric ciphers are one of the most important components of modern information security systems. At the same time, in addition to the structure of the applied block symmetric cipher, the cryptographic strength and performance of the information ...
A. V. Sokolov, D. A. Isakov
doaj   +1 more source

AEUR: authenticated encryption algorithm design based on uBlock round function

open access: yesTongxin xuebao, 2023
In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR was designed.Firstly, based on the uBlock round function,
Yatao YANG   +3 more
doaj   +2 more sources

Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Real-world applications of authenticated encryption often require the encryption to be computable online, e.g. to compute the ith block of ciphertext after having processed the first i blocks of plaintext.
Guillaume Endignoux, Damian Vizár
doaj   +1 more source

Publicly verifiable authenticated encryption

open access: yesElectronics Letters, 2003
A new authenticated encryption scheme with public verifiability is presented. The new scheme requires less computational costs and communication overhead than the conventional signature-then-encryption approaches. Furthermore the message is not divulged during the public verification.
Changshe Ma, Kefei Chen
openaire   +2 more sources

Indifferentiable Authenticated Encryption [PDF]

open access: yes, 2018
We study Authenticated Encryption with Associated Data (AEAD) from the viewpoint of composition in arbitrary (single-stage) environments. We use the indifferentiability framework to formalize the intuition that a "good" AEAD scheme should have random ciphertexts subject to de-cryptability.
Barbosa, Manuel, Farshim, Pooya
openaire   +3 more sources

Validating a Web Service Security Abstraction by Typing [PDF]

open access: yes, 2004
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core   +2 more sources

The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
The bit-sliding paper of Jean et al. (CHES 2017) showed that the smallest-size circuit for SPN based block ciphers such as AES, SKINNY and PRESENT can be achieved via bit-serial implementations.
Fatih Balli   +2 more
doaj   +3 more sources

Quantum Fully Homomorphic Encryption With Verification [PDF]

open access: yes, 2017
Fully-homomorphic encryption (FHE) enables computation on encrypted data while maintaining secrecy. Recent research has shown that such schemes exist even for quantum computation.
A Broadbent   +9 more
core   +4 more sources

Home - About - Disclaimer - Privacy