نتایج جستجو برای: authenticated

تعداد نتایج: 4119  

Journal: :IEEE Transactions on Computers 2016

Journal: :Sistemnyj Analiz i Prikladnaâ Informatika 2021

Block symmetric ciphers are one of the most important components modern information security systems. At same time, in addition to structure applied block cipher, cryptographic strength and performance protection system is largely determined by encryption mode. In high high-quality destruction statistics, modes should also protect encrypted from occurred or intentionally introduced errors. this...

Journal: :I. J. Network Security 2015
Hui-Feng Huang Pin-Han Lin Min-Hsuan Tsai

A convertible authenticated encryption scheme allows the signer to create a valid authenticated ciphertext such that only the specified receiver can simultaneously recover and verify the message. To protect the receiver’s benefit of a later dispute on repudiation, the receiver has the ability to convert the signature into an ordinary one that can be verified by anyone. However, the previous pro...

Journal: :IACR Cryptology ePrint Archive 2016
Guillaume Endignoux Damian Vizár

Real-world applications of authenticated encryption often require the encryption to be computable online, e.g. to compute the ith block of ciphertext after having processed the first i blocks of plaintext. A significant line of research was dedicated to identifying security notions for online authenticated encryption schemes, that capture various security goals related to real-life scenarios. F...

Journal: :Lecture Notes in Computer Science 2021

It was long thought that symmetric cryptography only mildly affected by quantum attacks, and doubling the key length sufficient to restore security. However, recent works have shown Simon’s period finding algorithm breaks a large number of MAC authenticated encryption algorithms when adversary can query MAC/encryption oracle with superposition messages. In particular, OCB mode is broken in this...

2007
Han-Yu Lin Yi-Shiung Yeh

Authenticated encryption schemes allow the signer to generate an authenticated ciphertext such that only the designated recipient has the ability to recover the message and verify its corresponding signature. It can be seen that authenticated encryption schemes are applicable to lots of E-Commerce applications like credit card transactions, since these schemes simultaneously fulfill the securit...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2020

Journal: :Computers & Mathematics with Applications 2003

Journal: :Indian Journal of Science and Technology 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید