نتایج جستجو برای: authenticated cipher

تعداد نتایج: 16348  

Journal: :Annales UMCS, Informatica 2011
Wojciech Oszywa Rafal Gliwa

The first part of the paper explains the need for combining message encryption and authentication. We begin with the example to emphasize the fact that privacy does not imply authenticity. Then we prove, one needs both privacy and authenticity, even if one’s aim is just getting privacy. In the second part we present an overview of different methods for providing authenticated encryption (AE) i....

Journal: :International Journal for Research in Applied Science and Engineering Technology 2020

ژورنال: پژوهش های ریاضی 2015
Daneshgar , A, Khadem , B, Mohebipur , F,

In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...

Journal: :Advances in Science, Technology and Engineering Systems Journal 2017

Journal: :Iet Computers and Digital Techniques 2023

The protection of communications between Internet Things (IoT) devices is great concern because the information exchanged contains vital sensitive data. Malicious agents seek to exploit those data extract secret about owners or system. Power side channel attacks are on these their power consumption unintentionally leaks correlatable device's Several studies have demonstrated effectiveness authe...

Journal: :the modares journal of electrical engineering 2006
abbas ghaemi bafghi babak sadeghiyan reza safabakhsh

in this paper, we show how to obtain suitable differential charactristics for block ciphers with neural networks. we represent the operations of a block cipher, regarding their differential characteristics, through a directed weighted graph. in this way, the problem of finding the best differential characteristic for a block cipher reduces to the problem of finding the minimum-weight multi-path...

Journal: :International Journal of Computer Applications 2014

Journal: :IACR Cryptology ePrint Archive 2014
Andrey Bogdanov Martin M. Lauridsen Elmar Tischhauser

Authenticated encryption (AE) has recently gained renewed interest due to the ongoing CAESAR competition. This paper deals with the performance of block cipher modes of operation for AE in parallel software. We consider the example of the AES on Intel’s new Haswell microarchitecture that has improved instructions for AES and finite field multiplication. As opposed to most previous high-performa...

2000
Victor Boyko

This thesis provides a formal analysis of two kinds of cryptographic objects that used to be treated with much less rigor: All-or-Nothing Transforms (AONTs) and Password-Authenticated Key Exchange protocols. For both, novel formal definitions of security are given, and then practical and efficient constructions are proven secure. The constructions for password-authenticated key exchange are nov...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید