نتایج جستجو برای: authenticated encryption

تعداد نتایج: 30521  

Journal: :Evolving Systems 2021

The public cloud environment has attracted massive attackers to exploit insecure ports and access data, services other resources. Techniques, such as Public Key Encryption with Keyword Search (PEKS), could be deployed in security avoid accidents. PEKS allows users search encrypted documents by a specific keyword without compromising the original data security. first scheme was proposed 2004, si...

Journal: :IACR Cryptology ePrint Archive 2016
Cihangir Tezcan

ASCON is an authenticated encryption algorithm which is recently qualified for the second-round of the Competition for Authenticated Encryption: Security, Applicability, and Robustness. So far, successful differential, differential-linear, and cube-like attacks on the reduced-round ASCON are provided. In this work, we provide the inverse of ASCON’s linear layer in terms of rotations which can b...

Journal: :Wireless Networks 2015
Han-Yu Lin

Secure data transmission for the wireless sensor network (WSN) is always an important issue. The technique of traditional authenticated encryption allows a sensor node to generate a ciphertext which can only be decrypted and authenticated by a designated data aggregator. The convertible property further enables the aggregator to announce an ordinary signature for public verification. To allevia...

2014
Elena Andreeva Atul Luykx Bart Mennink Kan Yasuda

We present a new, misuse-resistant scheme for online authenticated encryption, following the framework set forth by Fleischmann et al. (FSE 2012). Our scheme, COBRA, is roughly as efficient as the GCM mode of operation for nonce-based authenticated encryption, performing one block cipher call plus one finite field multiplication per message block in a parallelizable way. The major difference fr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید