Results 31 to 40 of about 29,404 (289)
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
Over the last years, the side-channel analysis of Post-Quantum Cryptography (PQC) candidates in the NIST standardization initiative has received increased attention.
Melissa Azouaoui +3 more
doaj +3 more sources
Options for Securing RTP Sessions [PDF]
The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality ...
Perkins, C., Westerlund, M.
core +2 more sources
The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF
Two of the fastest types of cryptographic algorithms are the stream cipher and the almost-universal hash function. There are secure examples of each that process data in software using less than one CPU cycle per byte.
Ted Krovetz
doaj +1 more source
The Subterranean 2.0 Cipher Suite
This paper presents the Subterranean 2.0 cipher suite that can be used for hashing, MAC computation, stream encryption and several types of authenticated encryption schemes. At its core it has a duplex object with a 257-bit state and a lightweight single-
Joan Daemen +3 more
doaj +1 more source
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We present CMCC (CBC-MAC-CTR-CBC), an authenticated encryption scheme with associated data (AEAD) that is also nonce misuse ...
Jonathan Trostle
doaj +1 more source
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes [PDF]
We present the eXtended Ciphertext Block Chaining (XCBC) and the eXtended Electronic Codebook (XECB) encryption schemes or modes of encryption that can detect encrypted-message forgeries with high probability even when used with typical noncryptographic Manipulation Detection Code (MDC) functions (e.g., bitwise exclusive-or and cyclic redundancy code ...
Virgil D. Gligor, Pompiliu Donescu
openaire +1 more source
Practical Attacks on Full-round FRIET
FRIET is a duplex-based authenticated encryption scheme proposed at EUROCRYPT 2020. It follows a novel design approach for built-in countermeasures against fault attacks.
Senpeng Wang +4 more
doaj +1 more source
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging [PDF]
The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.
Chor Benny +13 more
core +2 more sources
A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service
In recent years, intelligent railway operation and maintenance using cloud technology have received wide consideration for the provision of public transport services.
Qiming Zheng +5 more
doaj +1 more source
Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework
Authenticated encryption with associated data (AEAD) schemes based on stream ciphers, such as ASCON and MORUS, typically use nonlinear feedback shift registers (NFSRs) and linear feedback shift registers (LFSRs) to generate variable-length key streams ...
Xinyue Zhang +3 more
doaj +1 more source

