Results 241 to 250 of about 95,826 (286)
A domain key-based secure SOME/IP protocol. [PDF]
Heo J, Kim H, Jo H.
europepmc +1 more source
Geochemical fingerprinting and machine learning for authenticating sparkling wine origins. [PDF]
Lu Y, Doerr C, Sebilo M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST), 2016
Trivium is one of the finalists of the eSTREAM project in hardware category. It is well known for its performance and security. A number of attacks have been published against the reduced versions of Trivium but the original Trivium is still unbroken. It is best suited for resource-constraint environments like RFID and wireless sensor networks.
Saad Islam, Inam Ul Haq
openaire +1 more source
Trivium is one of the finalists of the eSTREAM project in hardware category. It is well known for its performance and security. A number of attacks have been published against the reduced versions of Trivium but the original Trivium is still unbroken. It is best suited for resource-constraint environments like RFID and wireless sensor networks.
Saad Islam, Inam Ul Haq
openaire +1 more source
Robust Video Facial Authentication With Unsupervised Mode Disentanglement
2020 IEEE International Conference on Image Processing (ICIP), 2020Deep learning-based video facial authentication has limitations when it comes to real-world applications, due to large mode variations such as illumination, pose, and eyeglasses variations in real-life situations. Many of existing mode-invariant facial authentication methods need labels of each mode.
Minsu Kim, Hong Joo Lee, Sangmin Lee
exaly +2 more sources
A Block-Cipher Mode of Operation for Parallelizable Message Authentication [PDF]
We define and analyze a simple and fully parallelizable blockcipher mode of operation for message authentication. Parallelizability does not come at the expense of serial efficiency: in a conventional, serial environment, the algorithm's speed is within a few percent of the (inherently sequential) CBC MAC.
Phillip Rogaway
exaly +3 more sources
Attacking NTP's Authenticated Broadcast Mode
ACM SIGCOMM Computer Communication Review, 2016We identify two attacks on the Network Time Protocol (NTP)'s cryptographically-authenticated broadcast mode. First, we present a replay attack that allows an on-path attacker to indefinitely stick a broadcast client to a specific time. Second, we present a denial-of-service (DoS) attack that allows an off-path attacker to prevent a broadcast client ...
Aanchal Malhotra, Sharon Goldberg
openaire +2 more sources
Lightweight Authenticated Encryption Mode with Enhancing Security Guarantees
2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS), 2021Under the lightweight setting, the security requirements and the leaking security bits for devices or systems are stricter. This paper focuses on the security of permutation-based lightweight authenticated encryption (LAE) modes, presents a new syntax of LAE, and, on the basis of OPP.
Ping Zhang 0020, Qian Yuan
openaire +1 more source
Watermarking authentication: Using the fragile mode or the robust mode?
Journal of Electronics (China), 2006Due to the lack of a unified authentication model certain mistakes occurred in the use of the watermarking authentication methods. To clarify the confusion, authentication models of robust and fragile watermarking are developed respectively in the paper. Concrete algorithms are proposed to prove the models that different Discrete Wavelet Transform (DWT)
Dan Chen, Qianhong Wu, Yumin Wang
openaire +1 more source
Breaking the IOC Authenticated Encryption Mode
2014In this paper we cryptanalyse a block cipher mode of operation, called Input Output Chaining (IOC), designed by Recacha and submitted to NIST in 2013 for consideration as a lightweight authenticated encryption mode. We present an existential forgery attack against IOC which makes only one chosen message query, runs in a small constant time, and ...
Paul Bottinelli +2 more
openaire +1 more source
Authentication Key Recovery on Galois/Counter Mode (GCM)
Lecture Notes in Computer Science, 2016GCM is used in a vast amount of security protocols and is quickly becoming the de facto mode of operation for block ciphers due to its exceptional performance. In this paper we analyze the NIST standardized version SP 800-38D of GCM, and in particular the use of short tag lengths.
John Preuß Mattsson, Magnus Westerlund
exaly +2 more sources

