Results 21 to 30 of about 95,826 (286)

The Software Performance of Authenticated-Encryption Modes [PDF]

open access: yes, 2011
We study software performance of authenticated-encryption modes CCM, GCM, and OCB. Across a variety of platforms, we find OCB to be substantially faster than either alternative. For example, on an Intel i5 ("Clarkdale") processor, good implementations of CCM, GCM, and OCB encrypt at around 4.2 cpb, 3.7 cpb, and 1.5 cpb, while CTR mode requires about 1 ...
Ted Krovetz, Phillip Rogaway
openaire   +1 more source

A fundamental flaw in the ++AE authenticated encryption mode [PDF]

open access: yesJournal of Mathematical Cryptology, 2018
Abstract In this article, we analyse a block cipher mode of operation for authenticated encryption known as ++AE (plus-plus-AE). We show that this mode has a fundamental flaw: the scheme does not verify the most significant bit of any block in the plaintext message.
Hassan Qahur Al Mahri   +4 more
openaire   +4 more sources

Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes [PDF]

open access: yes, 2002
We present the eXtended Ciphertext Block Chaining (XCBC) and the eXtended Electronic Codebook (XECB) encryption schemes or modes of encryption that can detect encrypted-message forgeries with high probability even when used with typical noncryptographic Manipulation Detection Code (MDC) functions (e.g., bitwise exclusive-or and cyclic redundancy code ...
Virgil D. Gligor, Pompiliu Donescu
openaire   +1 more source

A Lightweight User Authentication Scheme for Multi-Gateway Based Wireless Sensor Networks Using Rabin Cryptosystem

open access: yesIEEE Access, 2023
The existing authentication schemes in wireless sensor networks (WSNs) are mostly used in single-gateway mode. With the wide deployment of WSNs, the drawbacks of single-gateway mode are gradually becoming more noticeable.
Xingwen Zhao, Dexin Li
doaj   +1 more source

GridFTP: Protocol Extensions to FTP for the Grid [PDF]

open access: yes, 2013
GridFTP: Protocol Extensions to FTP for the ...
Ould-Saada, Farid
core   +1 more source

Authentication of Scalable Video Coding Streams Based on Topological Sort on Decoding Dependency Graph

open access: yesIEEE Access, 2017
The security of streaming data should be ensured in current complex data era in order to provide a trusted and secure network environment. To authenticate the scalable video coding (SVC) streams by fully utilizing its decoding relationship without ...
Qiang Ma, Ling Xing, Longshui Zheng
doaj   +1 more source

On the Security of Sponge-type Authenticated Encryption Modes

open access: yesIACR Transactions on Symmetric Cryptology, 2020
The sponge duplex is a popular mode of operation for constructing authenticated encryption schemes. In fact, one can assess the popularity of this mode from the fact that around 25 out of the 56 round 1 submissions to the ongoing NIST lightweight cryptography (LwC) standardization process are based on this mode.
Chakraborty, Bishwajit   +2 more
openaire   +4 more sources

A Reconfigurable Antenna-Based Solution for Stationary Device Authentication in Wireless Networks

open access: yesInternational Journal of Antennas and Propagation, 2012
Applying channel information for user authentication is gaining attention in the area of wireless network security. Similarly, reconfigurable antennas capable of generating multiple decorrelated channel realizations have become increasingly popular in ...
Prathaban Mookiah, Kapil R. Dandekar
doaj   +1 more source

A Multifactor Multilevel and Interaction Based (M2I) Authentication Framework for Internet of Things (IoT) Applications

open access: yesIEEE Access, 2022
Existing authentication solutions proposed for Internet of Things (IoT) provide a single Level of Assurance (LoA) regardless of the sensitivity levels of the resources or interactions between IoT devices being protected.
Salem AlJanah, Ning Zhang, Siok Wah Tay
doaj   +1 more source

A new security architecture for SIP based P2P computer networks [PDF]

open access: yes, 2008
Many applications are transferred from C/S (Client/Server) mode to P2P (Peer-to-Peer) mode such as VoIP (Voice over IP). This paper presents a new security architecture, i.e.
Tang, S, Yip, YJ, Yongfeng, H
core   +2 more sources

Home - About - Disclaimer - Privacy