Results 41 to 50 of about 370,613 (347)

Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
The security of Internet of Things (IoT) devices relies on fundamental concepts such as cryptographically protected firmware updates. In this context attackers usually have physical access to a device and therefore side-channel attacks have to be ...
Florian Unterstein   +5 more
doaj   +1 more source

ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode

open access: yesIACR Transactions on Symmetric Cryptology, 2020
NIST has recently initiated a standardization project for efficient lightweight authenticated encryption schemes. SUNDAE, a candidate in this project, achieves optimal state size which results in low circuit overhead on top of the underlying block cipher.
Avik Chakraborti   +5 more
semanticscholar   +1 more source

Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework

open access: yesCryptography
Authenticated encryption with associated data (AEAD) schemes based on stream ciphers, such as ASCON and MORUS, typically use nonlinear feedback shift registers (NFSRs) and linear feedback shift registers (LFSRs) to generate variable-length key streams ...
Xinyue Zhang   +3 more
doaj   +1 more source

Multi-Keyword Certificateless Searchable Public Key Authenticated Encryption Scheme Based on Blockchain

open access: yesIEEE Access, 2020
As a quite attractive secure search mechanism in cloud environments, searchable encryption allows encrypted files to be searched by keyword and does not reveal any information about original data files.
Xiaodong Yang   +4 more
semanticscholar   +1 more source

How to reuse a one-time pad and other notes on authentication, encryption and protection of quantum information [PDF]

open access: yes, 2005
Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases.
Horodecki, Michal, Oppenheim, Jonathan
core   +2 more sources

Context-Committing Authenticated Encryptions Using Tweakable Stream Cipher

open access: yesIEEE Access
Committing security of authenticated encryption schemes is an emerging area and an active field of research and is highly motivated by real-world scenarios.
Donghoon Chang, Munawar Hasan
doaj   +1 more source

High-level Cryptographic Abstractions

open access: yes, 2019
The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while ...
Chand, Saksham   +4 more
core   +1 more source

Enabling Practical IPsec authentication for the Internet [PDF]

open access: yes, 2006
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (First International Workshop on Information Security (IS'06), OTM Federated Conferences and workshops). Montpellier, Oct,/Nov.
Delgado Kloos, Carlos   +3 more
core   +3 more sources

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging [PDF]

open access: yes, 2018
The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.
Chor Benny   +13 more
core   +2 more sources

Home - About - Disclaimer - Privacy