Fault attacks on authenticated encryption modes for GIFT [PDF]
Abstract There are several authenticated encryption modes for block cipher GIFT in the NIST lightweight cryptography standardisation process. In this study, the authors research on the fault attacks on this kind of authenticated encryption modes and mainly complete two tasks.
Shuai Liu, Jie Guan, Bin Hu 0011
openaire +2 more sources
The mF mode of authenticated encryption with associated data [PDF]
Abstract In recent years, the demand for lightweight cryptographic protocols has grown immensely. To fulfill this necessity, the National Institute of Standards and Technology (NIST) has initiated a standardization process for lightweight cryptographic encryption.
Chakraborty Bishwajit, Nandi Mridul
openaire +2 more sources
On modes of operations of a block cipher for authentication and authenticated encryption [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Debrup Chakraborty, Palash Sarkar 0001
openaire +2 more sources
An application of DEMATEL for transaction authentication in online banking [PDF]
Business trades among individuals, companies, firms, enterprises, and governments are rapidly expelled from their traditional mode, which were mainly based on paper-based exchange, and are geared towards trading through information-based systems.
Ali Sepehri-Rad +2 more
doaj +1 more source
PKI cross-domain authentication scheme based on advanced PBFT algorithm
In order to solve the efficiency problem of the existing public key infrastructure cross-domain authentication scheme,a cross-domain authentication model based on the consortium blockchain which has the advantages of distributed and difficult to be ...
Sijie QIAN, Liquan CHEN, Shihui WANG
doaj +3 more sources
E1-E6 SDR Platform Based on BladeRF for Testing Galileo-Assisted Commercial Authentication Service
To enhance the robustness of the Global Navigation Satellite System (GNSS) against malicious attacks (e.g., spoofing), the European Galileo is working on new services, like Open Service Navigation Message Authentication (OSNMA), which provides ...
Rafael Terris-Gallego +3 more
doaj +1 more source
New mode of operation inspired by the braid of long hair [PDF]
In cryptography, a mode of operation is the way of processing plaintext and encrypted text blocks within a block cipher algorithm, or it is the presentation of a method of chaining blocks in a block cipher.
Hana ALI-PACHA +2 more
doaj +1 more source
Forgery attacks on ++AE authenticated encryption mode [PDF]
In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic competition for authenticated encryption (CAESAR). This mode is designed by Recacha and called ++AE (plus-plus-ae). We propose a chosen plaintext forgery attack on ++AE that requires only a single chosen message query to allow an attacker to construct ...
Hassan Qahur Al Mahri +4 more
openaire +2 more sources
Authenticated encryption mode with blocks skipping
Block symmetric ciphers are one of the most important components of modern information security systems. At the same time, in addition to the structure of the applied block symmetric cipher, the cryptographic strength and performance of the information protection system is largely determined by the applied encryption mode.
Sokolov, A. V., Isakov, D. A.
openaire +4 more sources
An efficient multilevel security architecture for blockchain-based IoT networks using principles of cellular automata [PDF]
The tremendous increase in the use of Internet of Things (IoT) has made an impact worldwide by changing the mode of day-to-day life. Like any other application, IoT based networks also have to be protected since the data produced consist of sensitive ...
Fasila Ali, Sheena Mathew
doaj +2 more sources

