„Authenticated Encryption“
Suchergebnisse
157 Treffer
-
Xoodyak, a lightweight cryptographic scheme
-
Pyjamask: block cipher and authenticated encryption with highly efficient masked implementation
-
Duel of the titans: the Romulus and Remus families of lightweight AEAD algorithms
-
Towards low-energy leakage-resistant authenticated encryption from the duplex sponge construction
-
A color image authenticated encryption using conic curve and Mersenne twister
-
Deniably authenticated searchable encryption scheme based on Blockchain for medical image data sharing
-
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
-
Adaptively secure broadcast encryption with authenticated content distributors
-
Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption
-
Analyzing the linear keystream biases in AEGIS
-
Weak keys in the rekeying paradigm: application to COMET and mixFeed
-
Release of unverified plaintext: tight unified model and application to ANYDAE
-
Security of symmetric primitives against key-correlated attacks
-
DoveMAC: a TBC-based PRF with smaller state, full security, and high rate
-
ZOCB and ZOTR: tweakable blockcipher modes for authenticated encryption with full absorption
-
libInterMAC: beyond confidentiality and integrity in practice
-
A note on the strong authenticated key exchange with auxiliary inputs
-
ASICS: authenticated key exchange security incorporating certification systems
-
Strengthening the security of authenticated key exchange against bad randomness
-
Blockcipher-Based Authenticated Encryption: How Small Can We Go?