Results 21 to 30 of about 370,613 (347)

Quantum Half and Full Spinning Operator-Based Nonlinear Confusion Component

open access: yesIEEE Access, 2021
The structure of a substitution box (S-box) is one of the principal ideas of the modern encryption techniques. The security of a modern encryption algorithm highly depends on its nonlinear confusion component.
Abdullah Alghafis
doaj   +1 more source

Generic Construction of Fully Anonymous Broadcast Authenticated Encryption with Keyword Search with Adaptive Corruptions

open access: yesIET Information Security, 2023
As a multireceiver variant of public key authenticated encryption with keyword search (PAEKS), broadcast authenticated encryption with keyword search (BAEKS) was proposed by Liu et al. (ACISP 2021).
Keita Emura
doaj   +1 more source

Authenticated encryption mode with blocks skipping

open access: yesСистемный анализ и прикладная информатика, 2021
Block symmetric ciphers are one of the most important components of modern information security systems. At the same time, in addition to the structure of the applied block symmetric cipher, the cryptographic strength and performance of the information ...
A. V. Sokolov, D. A. Isakov
doaj   +1 more source

AEUR: authenticated encryption algorithm design based on uBlock round function

open access: yesTongxin xuebao, 2023
In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR was designed.Firstly, based on the uBlock round function,
Yatao YANG   +3 more
doaj   +2 more sources

Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Real-world applications of authenticated encryption often require the encryption to be computable online, e.g. to compute the ith block of ciphertext after having processed the first i blocks of plaintext.
Guillaume Endignoux, Damian Vizár
doaj   +1 more source

Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
We revisit Unterstein et al.’s leakage-resilient authenticated encryption scheme from CHES 2020. Its main goal is to enable secure software updates by leveraging unprotected (e.g., AES, SHA256) coprocessors available on low-end microcontrollers.
Olivier Bronchain   +3 more
semanticscholar   +1 more source

Publicly verifiable authenticated encryption

open access: yesElectronics Letters, 2003
A new authenticated encryption scheme with public verifiability is presented. The new scheme requires less computational costs and communication overhead than the conventional signature-then-encryption approaches. Furthermore the message is not divulged during the public verification.
Changshe Ma, Kefei Chen
openaire   +2 more sources

Validating a Web Service Security Abstraction by Typing [PDF]

open access: yes, 2004
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core   +2 more sources

The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
The bit-sliding paper of Jean et al. (CHES 2017) showed that the smallest-size circuit for SPN based block ciphers such as AES, SKINNY and PRESENT can be achieved via bit-serial implementations.
Fatih Balli   +2 more
doaj   +3 more sources

Options for Securing RTP Sessions [PDF]

open access: yes, 2014
The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality ...
Perkins, C., Westerlund, M.
core   +2 more sources

Home - About - Disclaimer - Privacy