Articles with "encryption schemes" as a keyword



Photo by christianw from unsplash

Authenticated Encryption Schemes: A Systematic Review

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3147201

Abstract: Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research have… read more here.

Keywords: encryption schemes; encryption; schemes systematic; authenticated encryption ... See more keywords
Photo from wikipedia

Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Multimedia"

DOI: 10.1109/tmm.2020.3011315

Abstract: In recent decades, there has been considerable popularity in employing nonlinear dynamics and permutation-substitution structures for image encryption. Three procedures generally exist in such image encryption schemes: the key schedule module for producing encryption elements,… read more here.

Keywords: attack; image encryption; image; family image ... See more keywords