Results 181 to 190 of about 981,149 (222)
Some of the next articles are maybe not open access.

Analysis and Inner-Round Pipelined Implementation of Selected Parallelizable CAESAR Competition Candidates

2017 Euromicro Conference on Digital System Design (DSD), 2017
In this thesis, we have first characterized candidates of the Competition for Authenticated Encryption, Security, Applicability, and Robustness (CAESAR). Then, we have chosen five candidates from the Round 2 and Round 3 submissions, namely SCREAM, AES-COPA, Minalpher, OCB, and AES-OTR.
Sanjay Deshpande, Kris Gaj
semanticscholar   +4 more sources

Rendering unto Caesar? Religious Competition and Catholic Political Strategy in Latin America, 1962–79*

American Journal of Political Science, 1994
Since the late 1950s, the Latin American Church has undergone radical changes in terms of theology and pastoral organization. Innovations such as liberation theology and comunidades eclesiales de bases (CEBs) have tended to reinvigorate the political role the Church plays in society. Moreover, in several authoritarian regimes, the Roman Catholic Church
A. Gill
semanticscholar   +3 more sources

Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition

Frontiers of Information Technology & Electronic Engineering, 2018
The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) supported by the National Institute of Standards and Technology (NIST) is an ongoing project calling for submissions of authenticated encryption (AE) schemes. The competition itself aims at enhancing both the design of AE schemes and related analysis.
Fan Zhang   +5 more
openaire   +2 more sources

Competition and Conflict after Caesar (44–36 BC)

From Caesar to Augustus (c. 49 BC–AD 14), 2018
Explores how coinage was used to communicate competing ideologies after Caesar's assassination in 44 BC. Both Roman and provincial coins demonstrate a dialogue of power.The competition between Mark Antony and Octavian to be Caesar's heir is discussed, as are the coins of the assassins, Brutus and Cassius. The increasing use of divine imagery and divine
C. Rowan
openaire   +2 more sources

Face-off Between the CAESAR Lightweight Finalists: ACORN vs. Ascon

International Conference on Field-Programmable Technology, 2018
Authenticated ciphers potentially provide resource savings and security improvements over the joint use of secret-key ciphers and message authentication codes.
William Diehl   +4 more
semanticscholar   +1 more source

Toward a new HLS-based methodology for FPGA benchmarking of candidates in cryptographic competitions: The CAESAR contest case study

2017 International Conference on Field Programmable Technology (ICFPT), 2017
The increasing number of candidates competing in cryptographic contests has made hardware benchmarking using the traditional Register-Transfer Level (RTL) methodology too inefficient and potentially unfair, especially at the early stages of the competitions.
Ekawat Homsirikamol, Kris Gaj George
openaire   +1 more source

CAESAR-MPSoC: Dynamic and Efficient MPSoC Security Zones

IEEE Computer Society Annual Symposium on VLSI, 2019
Dynamic security zones in Multiprocessor System-on-Chip (MP-SoC) has been used to isolate sensitive applications from possible attackers. These physical wrappers are usually configured through programmable hardware firewalls.
Siavoosh Payandeh Azad   +3 more
semanticscholar   +1 more source

On Misuse of Nonce-Misuse Resistance : Adapting Differential Fault Attacks on (few) CAESAR Winners

International Workshop on Advances in Sensors and Interfaces, 2019
New cryptographic schemes are often built upon old and proven primitives which withstood long public scrutiny. The recently concluded CAESAR competition saw several authenticated ciphers which were directly built upon proven primitives like AES. However,
Mustafa Khairallah   +2 more
semanticscholar   +1 more source

Implementation Efficiency and Alternations, on CAESAR Finalists: AEGIS Approach

2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2018
Cryptography and security are of vital significance, as digital life increasingly aligns with modern human routine. It is without doubt that cryptographic algorithms need to be accompanied by synchronous, real – time response systems; plus, they often ...
Maria Katsaiti, N. Sklavos
semanticscholar   +1 more source

Experimental Power and Performance Evaluation of CAESAR Hardware Finalists

International Conference on Reconfigurable Computing and FPGAs, 2018
In 2013 the Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) was started. It aims at determining a portfolio of ciphers for authenticated encryption that has advantages over AES-GCM in terms of performance ...
Michael Tempelmeier, G. Sigl, J. Kaps
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy