Results 41 to 50 of about 370,613 (347)
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
The security of Internet of Things (IoT) devices relies on fundamental concepts such as cryptographically protected firmware updates. In this context attackers usually have physical access to a device and therefore side-channel attacks have to be ...
Florian Unterstein +5 more
doaj +1 more source
ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode
NIST has recently initiated a standardization project for efficient lightweight authenticated encryption schemes. SUNDAE, a candidate in this project, achieves optimal state size which results in low circuit overhead on top of the underlying block cipher.
Avik Chakraborti +5 more
semanticscholar +1 more source
Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework
Authenticated encryption with associated data (AEAD) schemes based on stream ciphers, such as ASCON and MORUS, typically use nonlinear feedback shift registers (NFSRs) and linear feedback shift registers (LFSRs) to generate variable-length key streams ...
Xinyue Zhang +3 more
doaj +1 more source
As a quite attractive secure search mechanism in cloud environments, searchable encryption allows encrypted files to be searched by keyword and does not reveal any information about original data files.
Xiaodong Yang +4 more
semanticscholar +1 more source
How to reuse a one-time pad and other notes on authentication, encryption and protection of quantum information [PDF]
Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases.
Horodecki, Michal, Oppenheim, Jonathan
core +2 more sources
Context-Committing Authenticated Encryptions Using Tweakable Stream Cipher
Committing security of authenticated encryption schemes is an emerging area and an active field of research and is highly motivated by real-world scenarios.
Donghoon Chang, Munawar Hasan
doaj +1 more source
High-level Cryptographic Abstractions
The interfaces exposed by commonly used cryptographic libraries are clumsy, complicated, and assume an understanding of cryptographic algorithms. The challenge is to design high-level abstractions that require minimum knowledge and effort to use while ...
Chand, Saksham +4 more
core +1 more source
Enabling Practical IPsec authentication for the Internet [PDF]
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (First International Workshop on Information Security (IS'06), OTM Federated Conferences and workshops). Montpellier, Oct,/Nov.
Delgado Kloos, Carlos +3 more
core +3 more sources
By dawn or dusk—how circadian timing rewrites bacterial infection outcomes
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo +2 more
wiley +1 more source
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging [PDF]
The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.
Chor Benny +13 more
core +2 more sources

