نتایج جستجو برای: authenticated encryption
تعداد نتایج: 30521 فیلتر نتایج به سال:
Motivated by the wide adoption of authenticated encryption and TLS, we suggest a basic channel abstraction, an augmented secure channel (ASC), that allows a sender to send a receiver messages consisting of two parts, where one is privacy-protected and both are authenticity-protected. Working in the tradition of constructive cryptography, we formalize this idea and provide a construction of this...
A convertible authenticated encryption scheme is very useful for transmitting a confidential message in insecure communication networks. This paper proposes a convertible authenticated encryption scheme with message linkages for message flows using Elliptic Curve Cryptography (ECC). The proposed scheme has the following advantages. (1) It can provide non-repudiation when the signer repudiates h...
In today’s world of big data and rapidly increasing telecommunications, using secure cryptographic primitives that are parallelizable and incremental is becoming ever more important design goal. π-Cipher is parallel, incremental, nonce based authenticated encryption cipher with associated data. It is designed with the special purpose of providing confidentiality and integrity for big data in tr...
NORX is a family of authenticated encryption algorithms that advanced to the third-round of the ongoing CAESAR competition for authenticated encryption schemes. In this work, we investigate the use of pipeline optimizations on ARM platforms to accelerate the execution of NORX. We also provide benchmarks of our implementation using NEON instructions. The results of our implementation show a spee...
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplify management. Public key encryption with keyword search (PEKS) an important cryptographic primitive as it provides ability for desired files among ciphertexts. As variant of PEKS, certificateless public authenticated (CLPAEKS) not only simplifies certificate management but also could resist guess...
Secure transmission of medical images and data is essential in healthcare systems, both telemedicine AI approaches. The compromise could affect patient privacy the accuracy diagnosis. Digital watermarking embeds into a non-significant image before to ensure visual security. However, it vulnerable white-box attacks because embedded can be extracted by an attacker that knows system’s operation do...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید