Results 181 to 190 of about 981,149 (222)
Some of the next articles are maybe not open access.
2017 Euromicro Conference on Digital System Design (DSD), 2017
In this thesis, we have first characterized candidates of the Competition for Authenticated Encryption, Security, Applicability, and Robustness (CAESAR). Then, we have chosen five candidates from the Round 2 and Round 3 submissions, namely SCREAM, AES-COPA, Minalpher, OCB, and AES-OTR.
Sanjay Deshpande, Kris Gaj
semanticscholar +4 more sources
In this thesis, we have first characterized candidates of the Competition for Authenticated Encryption, Security, Applicability, and Robustness (CAESAR). Then, we have chosen five candidates from the Round 2 and Round 3 submissions, namely SCREAM, AES-COPA, Minalpher, OCB, and AES-OTR.
Sanjay Deshpande, Kris Gaj
semanticscholar +4 more sources
American Journal of Political Science, 1994
Since the late 1950s, the Latin American Church has undergone radical changes in terms of theology and pastoral organization. Innovations such as liberation theology and comunidades eclesiales de bases (CEBs) have tended to reinvigorate the political role the Church plays in society. Moreover, in several authoritarian regimes, the Roman Catholic Church
A. Gill
semanticscholar +3 more sources
Since the late 1950s, the Latin American Church has undergone radical changes in terms of theology and pastoral organization. Innovations such as liberation theology and comunidades eclesiales de bases (CEBs) have tended to reinvigorate the political role the Church plays in society. Moreover, in several authoritarian regimes, the Roman Catholic Church
A. Gill
semanticscholar +3 more sources
Frontiers of Information Technology & Electronic Engineering, 2018
The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) supported by the National Institute of Standards and Technology (NIST) is an ongoing project calling for submissions of authenticated encryption (AE) schemes. The competition itself aims at enhancing both the design of AE schemes and related analysis.
Fan Zhang +5 more
openaire +2 more sources
The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) supported by the National Institute of Standards and Technology (NIST) is an ongoing project calling for submissions of authenticated encryption (AE) schemes. The competition itself aims at enhancing both the design of AE schemes and related analysis.
Fan Zhang +5 more
openaire +2 more sources
Competition and Conflict after Caesar (44–36 BC)
From Caesar to Augustus (c. 49 BC–AD 14), 2018Explores how coinage was used to communicate competing ideologies after Caesar's assassination in 44 BC. Both Roman and provincial coins demonstrate a dialogue of power.The competition between Mark Antony and Octavian to be Caesar's heir is discussed, as are the coins of the assassins, Brutus and Cassius. The increasing use of divine imagery and divine
C. Rowan
openaire +2 more sources
Face-off Between the CAESAR Lightweight Finalists: ACORN vs. Ascon
International Conference on Field-Programmable Technology, 2018Authenticated ciphers potentially provide resource savings and security improvements over the joint use of secret-key ciphers and message authentication codes.
William Diehl +4 more
semanticscholar +1 more source
2017 International Conference on Field Programmable Technology (ICFPT), 2017
The increasing number of candidates competing in cryptographic contests has made hardware benchmarking using the traditional Register-Transfer Level (RTL) methodology too inefficient and potentially unfair, especially at the early stages of the competitions.
Ekawat Homsirikamol, Kris Gaj George
openaire +1 more source
The increasing number of candidates competing in cryptographic contests has made hardware benchmarking using the traditional Register-Transfer Level (RTL) methodology too inefficient and potentially unfair, especially at the early stages of the competitions.
Ekawat Homsirikamol, Kris Gaj George
openaire +1 more source
CAESAR-MPSoC: Dynamic and Efficient MPSoC Security Zones
IEEE Computer Society Annual Symposium on VLSI, 2019Dynamic security zones in Multiprocessor System-on-Chip (MP-SoC) has been used to isolate sensitive applications from possible attackers. These physical wrappers are usually configured through programmable hardware firewalls.
Siavoosh Payandeh Azad +3 more
semanticscholar +1 more source
On Misuse of Nonce-Misuse Resistance : Adapting Differential Fault Attacks on (few) CAESAR Winners
International Workshop on Advances in Sensors and Interfaces, 2019New cryptographic schemes are often built upon old and proven primitives which withstood long public scrutiny. The recently concluded CAESAR competition saw several authenticated ciphers which were directly built upon proven primitives like AES. However,
Mustafa Khairallah +2 more
semanticscholar +1 more source
Implementation Efficiency and Alternations, on CAESAR Finalists: AEGIS Approach
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2018Cryptography and security are of vital significance, as digital life increasingly aligns with modern human routine. It is without doubt that cryptographic algorithms need to be accompanied by synchronous, real – time response systems; plus, they often ...
Maria Katsaiti, N. Sklavos
semanticscholar +1 more source
Experimental Power and Performance Evaluation of CAESAR Hardware Finalists
International Conference on Reconfigurable Computing and FPGAs, 2018In 2013 the Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) was started. It aims at determining a portfolio of ciphers for authenticated encryption that has advantages over AES-GCM in terms of performance ...
Michael Tempelmeier, G. Sigl, J. Kaps
semanticscholar +1 more source

