Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Applied Security Research"
DOI: 10.1080/19361610.2018.1463135
Abstract: ABSTRACT A new public authenticated encryption scheme based on chaotic maps and factoring problems is proposed. The chaos-based cryptosystem offers an encryption scheme with several advantages including secure transfer, high speed encryption, and reasonable computational…
read more here.
Keywords:
encryption scheme;
authenticated encryption;
maps factoring;
encryption ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2967070
Abstract: With technical development and internet popularization, Internet of Things (IoT) technology is gaining a wider application in various fields. Key challenges in the growth of IoT are related to privacy and security. To avoid any…
read more here.
Keywords:
encryption ciphers;
internet things;
security;
ciphers stream ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3147201
Abstract: Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have…
read more here.
Keywords:
encryption schemes;
encryption;
schemes systematic;
authenticated encryption ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3171853
Abstract: Since its birth in 2000, Authenticated Encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance. The block cipher was the dominant primitive in…
read more here.
Keywords:
sponge based;
protection;
based schemes;
authenticated encryption ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"
DOI: 10.1109/tcad.2017.2661811
Abstract: Cryptographic architectures provide different security properties to sensitive usage models. However, unless reliability of architectures is guaranteed, such security properties can be undermined through natural or malicious faults. In this paper, two underlying block ciphers…
read more here.
Keywords:
block;
reliable hardware;
authenticated encryption;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Journal of Mathematical Cryptology"
DOI: 10.1515/jmc-2020-0018
Abstract: Abstract Permutation-based modes have been established for lightweight authenticated encryption, as can be seen from the high interest in the ongoing NIST lightweight competition. However, their security is upper bounded by O(σ2/2c) bits, where σ…
read more here.
Keywords:
int rup;
authenticated encryption;
lightweight authenticated;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "Journal of Mathematical Cryptology"
DOI: 10.1515/jmc-2020-0054
Abstract: Abstract In recent years, the demand for lightweight cryptographic protocols has grown immensely. To fulfill this necessity, the National Institute of Standards and Technology (NIST) has initiated a standardization process for lightweight cryptographic encryption. NIST’s…
read more here.
Keywords:
encryption associated;
associated data;
encryption;
authenticated encryption ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Symmetry"
DOI: 10.3390/sym13122432
Abstract: In this paper, we propose, implement and analyze an Authenticated Encryption with Associated Data Scheme (AEADS) based on the Modified Duplex Construction (MDC) that contains a chaotic compression function (CCF) based on our chaotic neural…
read more here.
Keywords:
chaotic neural;
authenticated encryption;
duplex construction;
construction ... See more keywords