نتایج جستجو برای: authenticated encryption

تعداد نتایج: 30521  

Journal: :ITC 2014
Han-Yu Lin

Conventional authenticated encryption (AE) schemes put emphasis on the single-user setting, which only allow one signer to produce an authenticated ciphertext such that merely the designated recipient is capable of recovering the message and verifying its corresponding signature. In the multi-user environments, e.g., organizational operations, several senior managers might cooperatively sign a ...

Journal: :IACR Cryptology ePrint Archive 2017
Anindya Shankar Bhandari Dipanwita Roy Chowdhury

Tag-based message authentication is a popular cryptographic technique to digitally sign messages. However, for short messages, it often incurs additional costs due to large tags. In this paper, we propose a new scheme that achieves tagless message authentication. The scheme leverages a trade-off between character support and complexity of forgery to provide information security and authenticity.

Journal: :IACR transactions on cryptographic hardware and embedded systems 2022

Over the last years, side-channel analysis of Post-Quantum Cryptography (PQC) candidates in NIST standardization initiative has received increased attention. In particular, it been shown that some post-quantum Key Encapsulation Mechanisms (KEMs) are vulnerable to Chosen-Ciphertext Side-Channel Attacks (CC-SCA). These powerful attacks target re-encryption step Fujisaki-Okamoto (FO) transform, wh...

Journal: :Symmetry 2021

In this paper, we propose, implement and analyze an Authenticated Encryption with Associated Data Scheme (AEADS) based on the Modified Duplex Construction (MDC) that contains a chaotic compression function (CCF) our neural network revised (CNNR). Unlike standard duplex construction (SDC), in MDC there are two phases: initialization phase duplexing phase, each contain CNNR formed by single layer...

Journal: :RFC 2007
Russ Housley

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document specifies the conv...

Journal: :IACR Transactions on Cryptographic Hardware and Embedded Systems 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید