Results 11 to 20 of about 95,826 (286)

Fault attacks on authenticated encryption modes for GIFT [PDF]

open access: yesIET Information Security, 2021
Abstract There are several authenticated encryption modes for block cipher GIFT in the NIST lightweight cryptography standardisation process. In this study, the authors research on the fault attacks on this kind of authenticated encryption modes and mainly complete two tasks.
Shuai Liu, Jie Guan, Bin Hu 0011
openaire   +2 more sources

The mF mode of authenticated encryption with associated data [PDF]

open access: yesJournal of Mathematical Cryptology, 2022
Abstract In recent years, the demand for lightweight cryptographic protocols has grown immensely. To fulfill this necessity, the National Institute of Standards and Technology (NIST) has initiated a standardization process for lightweight cryptographic encryption.
Chakraborty Bishwajit, Nandi Mridul
openaire   +2 more sources

On modes of operations of a block cipher for authentication and authenticated encryption [PDF]

open access: yesCryptography and Communications, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Debrup Chakraborty, Palash Sarkar 0001
openaire   +2 more sources

An application of DEMATEL for transaction authentication in online banking [PDF]

open access: yesInternational Journal of Data and Network Science, 2019
Business trades among individuals, companies, firms, enterprises, and governments are rapidly expelled from their traditional mode, which were mainly based on paper-based exchange, and are geared towards trading through information-based systems.
Ali Sepehri-Rad   +2 more
doaj   +1 more source

PKI cross-domain authentication scheme based on advanced PBFT algorithm

open access: yes网络与信息安全学报, 2020
In order to solve the efficiency problem of the existing public key infrastructure cross-domain authentication scheme,a cross-domain authentication model based on the consortium blockchain which has the advantages of distributed and difficult to be ...
Sijie QIAN, Liquan CHEN, Shihui WANG
doaj   +3 more sources

E1-E6 SDR Platform Based on BladeRF for Testing Galileo-Assisted Commercial Authentication Service

open access: yesEngineering Proceedings, 2023
To enhance the robustness of the Global Navigation Satellite System (GNSS) against malicious attacks (e.g., spoofing), the European Galileo is working on new services, like Open Service Navigation Message Authentication (OSNMA), which provides ...
Rafael Terris-Gallego   +3 more
doaj   +1 more source

New mode of operation inspired by the braid of long hair [PDF]

open access: yesRevista Română de Informatică și Automatică, 2023
In cryptography, a mode of operation is the way of processing plaintext and encrypted text blocks within a block cipher algorithm, or it is the presentation of a method of chaining blocks in a block cipher.
Hana ALI-PACHA   +2 more
doaj   +1 more source

Forgery attacks on ++AE authenticated encryption mode [PDF]

open access: yesProceedings of the Australasian Computer Science Week Multiconference, 2016
In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic competition for authenticated encryption (CAESAR). This mode is designed by Recacha and called ++AE (plus-plus-ae). We propose a chosen plaintext forgery attack on ++AE that requires only a single chosen message query to allow an attacker to construct ...
Hassan Qahur Al Mahri   +4 more
openaire   +2 more sources

Authenticated encryption mode with blocks skipping

open access: yes«System analysis and applied information science», 2021
Block symmetric ciphers are one of the most important components of modern information security systems. At the same time, in addition to the structure of the applied block symmetric cipher, the cryptographic strength and performance of the information protection system is largely determined by the applied encryption mode.
Sokolov, A. V., Isakov, D. A.
openaire   +4 more sources

An efficient multilevel security architecture for blockchain-based IoT networks using principles of cellular automata [PDF]

open access: yesPeerJ Computer Science, 2022
The tremendous increase in the use of Internet of Things (IoT) has made an impact worldwide by changing the mode of day-to-day life. Like any other application, IoT based networks also have to be protected since the data produced consist of sensitive ...
Fasila Ali, Sheena Mathew
doaj   +2 more sources

Home - About - Disclaimer - Privacy