Results 181 to 190 of about 1,042,587 (227)

Synergistic activity of mupirocin in combination with protocatechuic acid ethyl ester against mupirocin-resistant MRSA. [PDF]

open access: yesFront Cell Infect Microbiol
Shen L   +11 more
europepmc   +1 more source

General classification of the authenticated encryption schemes for the CAESAR competition

Computer Science Review, 2016
Abstract An authenticated encryption scheme is a scheme which provides privacy and integrity by using a secret key. In 2013, CAESAR (the “Competition for Authenticated Encryption: Security, Applicability, and Robustness”) was co-founded by NIST and Dan Bernstein with the aim of finding authenticated encryption schemes that offer advantages over AES ...
Farzaneh Abed   +2 more
semanticscholar   +4 more sources

SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition

Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, 2017
Free to read on publisher website We investigate six authenticated encryption schemes (ACORN, ASCON-128a, ICEPOLE-128a, Ketje Jr, MORUS, and NORX-32) from the CAESAR competition. We aim at state recovery attacks using a SAT solver as a main tool. Our analysis reveals that these schemes, as submitted to CAESAR, provide strong resistance against SAT ...
Dwivedi, Ashutosh Dhar   +5 more
semanticscholar   +5 more sources

Analysis and Inner-Round Pipelined Implementation of Selected Parallelizable CAESAR Competition Candidates

2017 Euromicro Conference on Digital System Design (DSD), 2017
In this thesis, we have first characterized candidates of the Competition for Authenticated Encryption, Security, Applicability, and Robustness (CAESAR). Then, we have chosen five candidates from the Round 2 and Round 3 submissions, namely SCREAM, AES-COPA, Minalpher, OCB, and AES-OTR.
Sanjay Deshpande, Kris Gaj
semanticscholar   +4 more sources

Rendering unto Caesar? Religious Competition and Catholic Political Strategy in Latin America, 1962–79*

American Journal of Political Science, 1994
Since the late 1950s, the Latin American Church has undergone radical changes in terms of theology and pastoral organization. Innovations such as liberation theology and comunidades eclesiales de bases (CEBs) have tended to reinvigorate the political role the Church plays in society. Moreover, in several authoritarian regimes, the Roman Catholic Church
A. Gill
semanticscholar   +3 more sources

Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition

Frontiers of Information Technology & Electronic Engineering, 2018
The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) supported by the National Institute of Standards and Technology (NIST) is an ongoing project calling for submissions of authenticated encryption (AE) schemes. The competition itself aims at enhancing both the design of AE schemes and related analysis.
Fan Zhang   +5 more
openaire   +2 more sources

Competition and Conflict after Caesar (44–36 BC)

From Caesar to Augustus (c. 49 BC–AD 14), 2018
Explores how coinage was used to communicate competing ideologies after Caesar's assassination in 44 BC. Both Roman and provincial coins demonstrate a dialogue of power.The competition between Mark Antony and Octavian to be Caesar's heir is discussed, as are the coins of the assassins, Brutus and Cassius. The increasing use of divine imagery and divine
C. Rowan
openaire   +2 more sources

Face-off Between the CAESAR Lightweight Finalists: ACORN vs. Ascon

International Conference on Field-Programmable Technology, 2018
Authenticated ciphers potentially provide resource savings and security improvements over the joint use of secret-key ciphers and message authentication codes.
William Diehl   +4 more
semanticscholar   +1 more source

Toward a new HLS-based methodology for FPGA benchmarking of candidates in cryptographic competitions: The CAESAR contest case study

2017 International Conference on Field Programmable Technology (ICFPT), 2017
The increasing number of candidates competing in cryptographic contests has made hardware benchmarking using the traditional Register-Transfer Level (RTL) methodology too inefficient and potentially unfair, especially at the early stages of the competitions.
Ekawat Homsirikamol, Kris Gaj George
openaire   +1 more source

Home - About - Disclaimer - Privacy