Results 41 to 50 of about 1,634 (284)
A fundamental flaw in the ++AE authenticated encryption mode
In this article, we analyse a block cipher mode of operation for authenticated encryption known as ++AE (plus-plus-AE). We show that this mode has a fundamental flaw: the scheme does not verify the most significant bit of any block in the plaintext ...
Qahur Al Mahri Hassan +4 more
doaj +1 more source
AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption
In this paper, a new lightweight authenticated encryption scheme AESLBBB is proposed, which was designed to provide backward compatibility with advanced encryption standard (AES) as well as high security and low memory.
Yusuke Naito +2 more
doaj +1 more source
With the enormous growth in Internet of Things (IoT) applications, the volume of data shared among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial data transmission have made information integrity susceptible to ...
Susila Windarta +6 more
doaj +1 more source
Recently, massive research works have been accomplished for augmenting privacy and security requirements for cybersecurity applications in wireless communication networks.
Osama S. Faragallah +6 more
doaj +1 more source
Designing a New XTS-AES Parallel Optimization Implementation Technique for Fast File Encryption
XTS-AES is a disk encryption mode of operation that uses the block cipher AES. Several studies have been conducted to improve the encryption speed using XTS-AES according to the increasing disk size.
Sangwoo An, Seog Chung Seo
doaj +1 more source
ACE: ARIA-CTR Encryption for Low-End Embedded Processors
In this paper, we present the first optimized implementation of ARIA block cipher on low-end 8-bit Alf and Vegard’s RISC processor (AVR) microcontrollers.
Hwajeong Seo +3 more
doaj +1 more source
A quantum encryption design featuring confusion, diffusion, and mode of operation
Quantum cryptography—the application of quantum information processing and quantum computing techniques to cryptography has been extensively investigated.
Zixuan Hu, Sabre Kais
doaj +1 more source
On the Quantum Security of OCB
The OCB mode of operation for block ciphers has three variants, OCB1, OCB2 and OCB3. OCB1 and OCB3 can be used as secure authenticated encryption schemes whereas OCB2 has been shown to be classically insecure (Inoue et al., Crypto 2019).
Varun Maram +3 more
doaj +1 more source
Patterned Cipher Block for Low-Latency Secure Communication
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh +2 more
doaj +1 more source
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things
Lightweight cryptography was developed in response to the increasing need to secure devices for the Internet of Things. After significant research effort, many new block ciphers have been designed targeting lightweight settings, optimizing efficiency ...
Subhadeep Banik +3 more
doaj +1 more source

