Results 101 to 110 of about 1,329 (153)
Augmented sets of output differences and new distinguishers for SPN ciphers. [PDF]
Girme R, Rohit R, Sarkar S.
europepmc +1 more source
Enhancing security in instant messaging systems with a hybrid SM2, SM3, and SM4 encryption framework. [PDF]
Lu HJ, Juanatas RA, Abisado MB.
europepmc +1 more source
BBB Secure Arbitrary Length Tweak TBC from n-bit Block Ciphers [PDF]
At FSE\u2715, Mennink introduced two tweakable block ciphers, $\widetilde{F}[1]$ and $\widetilde{F}[2]$, both utilizing an $n$-bit tweak. It was demonstrated that $\widetilde{F}[1]$ is secure for up to $2^{2n/3}$ queries, while $\widetilde{F}[2]$ is ...
Arghya Bhattacharjee +4 more
core
Improving dependability with low power fault detection model for skinny-hash. [PDF]
Arvind Barge S, Mary GI.
europepmc +1 more source
Tortoise: An Authenticated Encryption Scheme
Given the open nature of the Internet, there is a need for authentication schemes to address inherent trust issues. We present Tortoise, an experimental nonce-based authenticated encryption scheme modeled on the Synthetic Counter-in-Tweak.
Odoh, Kenneth
core

