Results 21 to 30 of about 95,826 (286)
The Software Performance of Authenticated-Encryption Modes [PDF]
We study software performance of authenticated-encryption modes CCM, GCM, and OCB. Across a variety of platforms, we find OCB to be substantially faster than either alternative. For example, on an Intel i5 ("Clarkdale") processor, good implementations of CCM, GCM, and OCB encrypt at around 4.2 cpb, 3.7 cpb, and 1.5 cpb, while CTR mode requires about 1 ...
Ted Krovetz, Phillip Rogaway
openaire +1 more source
A fundamental flaw in the ++AE authenticated encryption mode [PDF]
Abstract In this article, we analyse a block cipher mode of operation for authenticated encryption known as ++AE (plus-plus-AE). We show that this mode has a fundamental flaw: the scheme does not verify the most significant bit of any block in the plaintext message.
Hassan Qahur Al Mahri +4 more
openaire +4 more sources
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes [PDF]
We present the eXtended Ciphertext Block Chaining (XCBC) and the eXtended Electronic Codebook (XECB) encryption schemes or modes of encryption that can detect encrypted-message forgeries with high probability even when used with typical noncryptographic Manipulation Detection Code (MDC) functions (e.g., bitwise exclusive-or and cyclic redundancy code ...
Virgil D. Gligor, Pompiliu Donescu
openaire +1 more source
The existing authentication schemes in wireless sensor networks (WSNs) are mostly used in single-gateway mode. With the wide deployment of WSNs, the drawbacks of single-gateway mode are gradually becoming more noticeable.
Xingwen Zhao, Dexin Li
doaj +1 more source
GridFTP: Protocol Extensions to FTP for the Grid [PDF]
GridFTP: Protocol Extensions to FTP for the ...
Ould-Saada, Farid
core +1 more source
The security of streaming data should be ensured in current complex data era in order to provide a trusted and secure network environment. To authenticate the scalable video coding (SVC) streams by fully utilizing its decoding relationship without ...
Qiang Ma, Ling Xing, Longshui Zheng
doaj +1 more source
On the Security of Sponge-type Authenticated Encryption Modes
The sponge duplex is a popular mode of operation for constructing authenticated encryption schemes. In fact, one can assess the popularity of this mode from the fact that around 25 out of the 56 round 1 submissions to the ongoing NIST lightweight cryptography (LwC) standardization process are based on this mode.
Chakraborty, Bishwajit +2 more
openaire +4 more sources
A Reconfigurable Antenna-Based Solution for Stationary Device Authentication in Wireless Networks
Applying channel information for user authentication is gaining attention in the area of wireless network security. Similarly, reconfigurable antennas capable of generating multiple decorrelated channel realizations have become increasingly popular in ...
Prathaban Mookiah, Kapil R. Dandekar
doaj +1 more source
Existing authentication solutions proposed for Internet of Things (IoT) provide a single Level of Assurance (LoA) regardless of the sensitivity levels of the resources or interactions between IoT devices being protected.
Salem AlJanah, Ning Zhang, Siok Wah Tay
doaj +1 more source
A new security architecture for SIP based P2P computer networks [PDF]
Many applications are transferred from C/S (Client/Server) mode to P2P (Peer-to-Peer) mode such as VoIP (Voice over IP). This paper presents a new security architecture, i.e.
Tang, S, Yip, YJ, Yongfeng, H
core +2 more sources

