نتایج جستجو برای: authenticated encryption

تعداد نتایج: 30521  

2015
Christian Badertscher Christian Matt Ueli Maurer Phillip Rogaway Björn Tackmann

Motivated by the wide adoption of authenticated encryption and TLS, we suggest a basic channel abstraction, an augmented secure channel (ASC), that allows a sender to send a receiver messages consisting of two parts, where one is privacy-protected and both are authenticity-protected. Working in the tradition of constructive cryptography, we formalize this idea and provide a construction of this...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2019

Journal: :The International Conference on Electrical Engineering 2018

2013
Eun-Jun Yoon Kee-Young Yoo

A convertible authenticated encryption scheme is very useful for transmitting a confidential message in insecure communication networks. This paper proposes a convertible authenticated encryption scheme with message linkages for message flows using Elliptic Curve Cryptography (ECC). The proposed scheme has the following advantages. (1) It can provide non-repudiation when the signer repudiates h...

2014
Danilo Gligoroski Hristina Mihajloska Simona Samardjiska Håkon Jacobsen Rune Erlend Jensen Mohamed El-Hadedy

In today’s world of big data and rapidly increasing telecommunications, using secure cryptographic primitives that are parallelizable and incremental is becoming ever more important design goal. π-Cipher is parallel, incremental, nonce based authenticated encryption cipher with associated data. It is designed with the special purpose of providing confidentiality and integrity for big data in tr...

2017
Luan Cardoso dos Santos Julio López

NORX is a family of authenticated encryption algorithms that advanced to the third-round of the ongoing CAESAR competition for authenticated encryption schemes. In this work, we investigate the use of pipeline optimizations on ARM platforms to accelerate the execution of NORX. We also provide benchmarks of our implementation using NEON instructions. The results of our implementation show a spee...

Journal: :ACM Transactions on Information and System Security 2010

Journal: :Information 2023

Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplify management. Public key encryption with keyword search (PEKS) an important cryptographic primitive as it provides ability for desired files among ciphertexts. As variant of PEKS, certificateless public authenticated (CLPAEKS) not only simplifies certificate management but also could resist guess...

Journal: :Applied sciences 2023

Secure transmission of medical images and data is essential in healthcare systems, both telemedicine AI approaches. The compromise could affect patient privacy the accuracy diagnosis. Digital watermarking embeds into a non-significant image before to ensure visual security. However, it vulnerable white-box attacks because embedded can be extracted by an attacker that knows system’s operation do...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید