Výsledky vyhledávání - Authenticated encryption algorithm

Upřesnit hledání
  1. 1

    Lightweight and flexible hardware implementation of authenticated encryption algorithm SIMON‐Galois/Counter Mode Autor Cheng, Xin, Xu, Yixuan, Wang, Kefan, Zhang, Yongqiang, Li, Bin, Zhang, Zhang

    ISSN: 0098-9886, 1097-007X
    Vydáno: Bognor Regis Wiley Subscription Services, Inc 01.12.2023
    “…Summary This brief proposes a new lightweight authenticated encryption algorithm SIMON…”
    Získat plný text
    Journal Article
  2. 2

    AEUR: authenticated encryption algorithm design based on uBlock round function Autor Yatao YANG, Hui DONG, Jiantao LIU, Yanshuo ZHANG

    ISSN: 1000-436X
    Vydáno: Editorial Department of Journal on Communications 01.08.2023
    Vydáno v Tongxin Xuebao (01.08.2023)
    “…In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR…”
    Získat plný text
    Journal Article
  3. 3

    AEUR: authenticated encryption algorithm design based on uBlock round function Autor Yatao YANG, Hui DONG, Jiantao LIU, Yanshuo ZHANG

    ISSN: 1000-436X
    Vydáno: Editorial Department of Journal on Communications 01.08.2023
    Vydáno v Tongxin Xuebao (01.08.2023)
    “…In order to improve the efficiency of the implementation of the authenticated encryption algorithm without compromising the security of the algorithm, a new authenticated encryption algorithm AEUR…”
    Získat plný text
    Journal Article
  4. 4

    Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128 Autor Salam, Iftekhar, Yau, Wei-Chuen, Phan, Raphaël C.-W., Pieprzyk, Josef

    ISSN: 2190-8508, 2190-8516
    Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.09.2023
    Vydáno v Journal of cryptographic engineering (01.09.2023)
    “…We investigate a technique that needs to apply multiple random faults to the same target location and compare the impact of these faults on the fault-free and…”
    Získat plný text
    Journal Article
  5. 5

    Architectural Optimization of Parallel Authenticated Encryption Algorithm for Satellite Application Autor Pirzada, Syed Jahanzeb Hussain, Murtaza, Abid, Xu, Tongge, Jianwei, Liu

    ISSN: 2169-3536, 2169-3536
    Vydáno: Piscataway IEEE 2020
    Vydáno v IEEE access (2020)
    “… Moreover, the Authenticated Encryption (AE) algorithms provide high-speed communication and security services include data encryption, authentication, and integrity…”
    Získat plný text
    Journal Article
  6. 6
  7. 7

    Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms Autor Xu, Yinsong, Liu, Wenjie, Yu, Wenbin

    ISSN: 1570-0755, 1573-1332
    Vydáno: New York Springer US 01.04.2021
    Vydáno v Quantum information processing (01.04.2021)
    “…The classic forgery attacks on COPA, AES-COPA and Marble authenticated encryption algorithms need to query about 2 n / 2 times, and their success probability is not high…”
    Získat plný text
    Journal Article
  8. 8

    Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant Authenticated Encryption Algorithms Autor Koteshwara, Sandhya, Das, Amitabh, Parhi, Keshab K.

    ISSN: 1063-8210, 1557-9999
    Vydáno: New York IEEE 01.05.2019
    “…This paper presents a performance comparison of new authenticated encryption (AE) algorithms which are aimed at providing better security and resource efficiency compared to existing standards…”
    Získat plný text
    Journal Article
  9. 9

    Implementing authenticated encryption algorithm MK-3 on FPGA Autor Werner, Gordon, Farris, Steven, Kaminsky, Alan, Kurdziel, Michael, Lukowiak, Marcin, Radziszowski, Stanislaw

    ISSN: 2155-7586
    Vydáno: IEEE 01.11.2016
    “…Authenticated encryption (AE) algorithms provide both data security and integrity…”
    Získat plný text
    Konferenční příspěvek
  10. 10

    Customization Modes for the Harris MK-3 Authenticated Encryption Algorithm Autor Bajorski, Peter, Kaminsky, Alan, Kurdziel, Michael, Lukowiak, Marcin, Radziszowski, Stanislaw

    ISSN: 2155-7586
    Vydáno: IEEE 01.10.2018
    “…MK-3 is a new proprietary authenticated encryption algorithm based on the duplex sponge construction…”
    Získat plný text
    Konferenční příspěvek
  11. 11

    Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition Autor Zhang, Fan, Liang, Zi-yuan, Yang, Bo-lin, Zhao, Xin-jie, Guo, Shi-ze, Ren, Kui

    ISSN: 2095-9184, 2095-9230
    Vydáno: Hangzhou Zhejiang University Press 01.12.2018
    “…The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR…”
    Získat plný text
    Journal Article
  12. 12

    Energy-harvesting Q-learning secure routing algorithm with authenticated-encryption for WSN Autor Li, Cuiran, Wu, Jixuan, Zhang, Zepeng, Lv, Anqi

    ISSN: 2405-9595, 2405-9595
    Vydáno: Elsevier 01.12.2023
    Vydáno v ICT express (01.12.2023)
    “… To address these issues, we innovatively propose an energy-harvesting Q-learning secure routing algorithm with authenticated-encryption…”
    Získat plný text
    Journal Article
  13. 13

    Ascon v1.2: Lightweight Authenticated Encryption and Hashing Autor Dobraunig, Christoph, Eichlseder, Maria, Mendel, Florian, Schläffer, Martin

    ISSN: 0933-2790, 1432-1378
    Vydáno: New York Springer US 01.07.2021
    Vydáno v Journal of cryptology (01.07.2021)
    “… In this paper, we provide the specification of Ascon -128 and Ascon -128a. Both authenticated encryption algorithms provide efficient authenticated encryption on resource-constrained devices and on high-end CPUs…”
    Získat plný text
    Journal Article
  14. 14

    Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN Autor Lara-Nino, Carlos Andres, Morales-Sandoval, Miguel, Diaz-Perez, Arturo

    ISSN: 1939-0114, 1939-0122, 1939-0122
    Vydáno: Cairo, Egypt Hindawi Publishing Corporation 01.01.2018
    Vydáno v Security and communication networks (01.01.2018)
    “… Authenticated encryption is a mechanism to provide these systems with confidentiality, integrity, and authentication of sensitive data…”
    Získat plný text
    Journal Article
  15. 15

    Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm Autor Fabinski, Peter, Farris, Steve, Kurdziel, Michael, Lukowiak, Marcin, Radziszowski, Stanislaw

    Vydáno: Lodz University of Technology 29.06.2023
    “…MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software…”
    Získat plný text
    Konferenční příspěvek
  16. 16
  17. 17

    Hardware-Software Co-Design of the Lightweight Authenticated Encryption Algorithm ASCON for Internet of Things Autor Wu, Yunqiang

    Vydáno: IEEE 20.12.2024
    “… This paper first summarizes the basic principle of ASCON algorithm and its position in NIST lightweight encryption standard, and then introduces the goal and implementation strategy of its software…”
    Získat plný text
    Konferenční příspěvek
  18. 18

    The Parallel CMAC Authenticated Encryption Algorithm for Satellite Communication Autor Hussain Pirzada, Syed Jahanzeb, Murtaza, Abid, Jianwei, Liu, Xu, Tongge

    ISBN: 1728111897, 9781728111896
    ISSN: 2377-844X
    Vydáno: IEEE 01.07.2019
    “… The Authenticated Encryption (AE) algorithm provides all these three services. Initially, AE algorithms were proposed with serial architecture…”
    Získat plný text
    Konferenční příspěvek
  19. 19

    Tulip: An Authenticated Encryption Algorithm with Trusted Identity Autor Zhang, Lan, Yu, Bin, He, Liangsheng

    Vydáno: IEEE 10.12.2021
    “…In this paper, the authenticated encryption algorithm (called Tulip) is integratedlydesigned based on the straightforward combination of CFB mode and CBC-MAC mode of blockcipher…”
    Získat plný text
    Konferenční příspěvek
  20. 20

    High frequency Area efficient architecture of lightweight authenticated encryption algorithm GIFT-COFB for resource-constrained IOT devices Autor Choubey, PankajKu, Patnaik, Bijayananda, Acharya, Bibhudendra

    Vydáno: IEEE 20.01.2025
    “…Safe and efficient cryptography solutions which may perform in the limitation of resources situations like Internet of Things systems etc is increasingly…”
    Získat plný text
    Konferenční příspěvek