Results 31 to 40 of about 370,613 (347)

Quantum Fully Homomorphic Encryption With Verification [PDF]

open access: yes, 2017
Fully-homomorphic encryption (FHE) enables computation on encrypted data while maintaining secrecy. Recent research has shown that such schemes exist even for quantum computation.
A Broadbent   +9 more
core   +4 more sources

Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Over the last years, the side-channel analysis of Post-Quantum Cryptography (PQC) candidates in the NIST standardization initiative has received increased attention.
Melissa Azouaoui   +3 more
doaj   +3 more sources

The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF

open access: yesCryptography, 2018
Two of the fastest types of cryptographic algorithms are the stream cipher and the almost-universal hash function. There are secure examples of each that process data in software using less than one CPU cycle per byte.
Ted Krovetz
doaj   +1 more source

The Subterranean 2.0 Cipher Suite

open access: yesIACR Transactions on Symmetric Cryptology, 2020
This paper presents the Subterranean 2.0 cipher suite that can be used for hashing, MAC computation, stream encryption and several types of authenticated encryption schemes. At its core it has a duplex object with a 257-bit state and a lightweight single-
Joan Daemen   +3 more
doaj   +1 more source

CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion

open access: yesCryptography, 2018
In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We present CMCC (CBC-MAC-CTR-CBC), an authenticated encryption scheme with associated data (AEAD) that is also nonce misuse ...
Jonathan Trostle
doaj   +1 more source

Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes [PDF]

open access: yes, 2002
We present the eXtended Ciphertext Block Chaining (XCBC) and the eXtended Electronic Codebook (XECB) encryption schemes or modes of encryption that can detect encrypted-message forgeries with high probability even when used with typical noncryptographic Manipulation Detection Code (MDC) functions (e.g., bitwise exclusive-or and cyclic redundancy code ...
Virgil D. Gligor, Pompiliu Donescu
openaire   +1 more source

Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication

open access: yesIEEE Access, 2020
The resource-constrained nature and large-scale adoption of Internet of Things (IoT) have a significant challenge for securing IoT applications. This necessitates a robust and lightweight security architecture and schemes as the existing traditional ...
A. Diro   +5 more
semanticscholar   +1 more source

Practical Attacks on Full-round FRIET

open access: yesIACR Transactions on Symmetric Cryptology, 2022
FRIET is a duplex-based authenticated encryption scheme proposed at EUROCRYPT 2020. It follows a novel design approach for built-in countermeasures against fault attacks.
Senpeng Wang   +4 more
doaj   +1 more source

Image encryption system based on a nonlinear joint transform correlator for the simultaneous authentication of two users [PDF]

open access: yes, 2019
We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system.
Millán Garcia-Varela, M. Sagrario   +2 more
core   +2 more sources

A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service

open access: yesIEEE Access, 2018
In recent years, intelligent railway operation and maintenance using cloud technology have received wide consideration for the provision of public transport services.
Qiming Zheng   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy