Results 101 to 110 of about 1,484 (155)

On the Hardware Implementation Efficiency of CAESAR Authentication Ciphers for FPGA Devices [PDF]

open access: yes, 2016
Kitsos, Paris   +2 more
core  

Improved meet-in-the-middle attack on Joltik-BC-128

open access: yes网络与信息安全学报
The Joltik-BC, adopting the substitution-permutation network structure and Tweakey framework, was a lightweight tweakable block cipher published at ASIACRPYPT 2014. By researching the internal characteristic of the Joltik-BC, a 6-round meet-in-the-middle
LI Zheng   +3 more
doaj  

Tortoise: An Authenticated Encryption Scheme

open access: yes
Given the open nature of the Internet, there is a need for authentication schemes to address inherent trust issues. We present Tortoise, an experimental nonce-based authenticated encryption scheme modeled on the Synthetic Counter-in-Tweak.
Odoh, Kenneth
core  

Home - About - Disclaimer - Privacy