Articles with "authenticated encryption" as a keyword



Photo by christianw from unsplash

Hybrid Publicly Verifiable Authenticated Encryption Scheme Based on Chaotic Maps and Factoring Problems

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Applied Security Research"

DOI: 10.1080/19361610.2018.1463135

Abstract: ABSTRACT A new public authenticated encryption scheme based on chaotic maps and factoring problems is proposed. The chaos-based cryptosystem offers an encryption scheme with several advantages including secure transfer, high speed encryption, and reasonable computational… read more here.

Keywords: encryption scheme; authenticated encryption; maps factoring; encryption ... See more keywords
Photo from wikipedia

Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2967070

Abstract: With technical development and internet popularization, Internet of Things (IoT) technology is gaining a wider application in various fields. Key challenges in the growth of IoT are related to privacy and security. To avoid any… read more here.

Keywords: encryption ciphers; internet things; security; ciphers stream ... See more keywords
Photo by christianw from unsplash

Authenticated Encryption Schemes: A Systematic Review

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3147201

Abstract: Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have… read more here.

Keywords: encryption schemes; encryption; schemes systematic; authenticated encryption ... See more keywords
Photo by pawelmc from unsplash

Parallel Sponge-based Authenticated Encryption with Side-Channel Protection and Adversary-Invisible Nonces

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3171853

Abstract: Since its birth in 2000, Authenticated Encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance. The block cipher was the dominant primitive in… read more here.

Keywords: sponge based; protection; based schemes; authenticated encryption ... See more keywords
Photo by framesforyourheart from unsplash

Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"

DOI: 10.1109/tcad.2017.2661811

Abstract: Cryptographic architectures provide different security properties to sensitive usage models. However, unless reliability of architectures is guaranteed, such security properties can be undermined through natural or malicious faults. In this paper, two underlying block ciphers… read more here.

Keywords: block; reliable hardware; authenticated encryption; security ... See more keywords
Photo from wikipedia

The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Mathematical Cryptology"

DOI: 10.1515/jmc-2020-0018

Abstract: Abstract Permutation-based modes have been established for lightweight authenticated encryption, as can be seen from the high interest in the ongoing NIST lightweight competition. However, their security is upper bounded by O(σ2/2c) bits, where σ… read more here.

Keywords: int rup; authenticated encryption; lightweight authenticated; security ... See more keywords
Photo by campaign_creators from unsplash

The mF mode of authenticated encryption with associated data

Sign Up to like & get
recommendations!
Published in 2022 at "Journal of Mathematical Cryptology"

DOI: 10.1515/jmc-2020-0054

Abstract: Abstract In recent years, the demand for lightweight cryptographic protocols has grown immensely. To fulfill this necessity, the National Institute of Standards and Technology (NIST) has initiated a standardization process for lightweight cryptographic encryption. NIST’s… read more here.

Keywords: encryption associated; associated data; encryption; authenticated encryption ... See more keywords
Photo by sunburned_surveyor from unsplash

Authenticated Encryption Based on Chaotic Neural Networks and Duplex Construction

Sign Up to like & get
recommendations!
Published in 2021 at "Symmetry"

DOI: 10.3390/sym13122432

Abstract: In this paper, we propose, implement and analyze an Authenticated Encryption with Associated Data Scheme (AEADS) based on the Modified Duplex Construction (MDC) that contains a chaotic compression function (CCF) based on our chaotic neural… read more here.

Keywords: chaotic neural; authenticated encryption; duplex construction; construction ... See more keywords