Zobrazeno 1 - 10
of 2 224
pro vyhledávání: '"Authenticated encryption"'
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-15 (2024)
Abstract With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern. Searchable
Externí odkaz:
https://doaj.org/article/2d465664c8f9408cb78fbad225e4a6df
Autor:
Xavier Bonnetain, André Schrottenloher
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 3 (2024)
Quantum attacks using superposition queries are known to break many classically secure modes of operation. While these attacks do not necessarily threaten the security of the modes themselves, since they rely on a strong adversary model, they help us
Externí odkaz:
https://doaj.org/article/49137e6c63dd4581a8f65375db2f2ff9
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 3 (2024)
Low-latency masked hardware implementations are known to be a difficult challenge. On the one hand, the propagation of glitches can falsify their independence assumption (that is required for security) and can only be stopped by registers. This impli
Externí odkaz:
https://doaj.org/article/2dfdd6f9e17943a3bce1200ee945a53b
Autor:
Donghoon Chang, Munawar Hasan
Publikováno v:
IEEE Access, Vol 12, Pp 84149-84168 (2024)
Committing security of authenticated encryption schemes is an emerging area and an active field of research and is highly motivated by real-world scenarios. CMT-4 security of authenticated encryption scheme is a security notion, where an adversary mu
Externí odkaz:
https://doaj.org/article/a1a70272c24c49f49981ed8c5b7695bf
Autor:
Chandranan Dhar, Jordan Ethan, Ravindra Jejurikar, Mustafa Khairallah, Eik List, Sougata Mandal
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 2 (2024)
During recent years, research on authenticated encryption has been thriving through two highly active and practically motivated research directions: provable leakage resilience and key- or context-commitment security. However, the intersection of bot
Externí odkaz:
https://doaj.org/article/8e1541836cb34ba290ba0b2e4a2cd773
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 2 (2024)
Authenticated Encryption (AE) modes of operation based on Tweakable Block Ciphers (TBC) usually measure efficiency in the number of calls to the underlying primitive per message block. On the one hand, many existing solutions reach a primitive-rate o
Externí odkaz:
https://doaj.org/article/ded334cc6f344bc6ada2d4f6ad4abe30
Autor:
Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 2 (2024)
In this paper, we propose a new family of low-latency pseudorandom functions (PRFs), dubbed Gleeok. Gleeok utilizes three 128-bit branches to achieve a 256-bit key size while maintaining low latency. The first two branches are specifically designed t
Externí odkaz:
https://doaj.org/article/adbbf71c4c0a46578e9e93edc64b2945
Autor:
Patrick Struck, Maximiliane Weishäupl
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 1 (2024)
The main goal of this work is to construct authenticated encryption (AE) hat is both committing and leakage-resilient. As a first approach for this we consider generic composition as a well-known method for constructing AE schemes. While the leakage
Externí odkaz:
https://doaj.org/article/12a597baed314e1f81af2ee19dd6caf5
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 1 (2024)
DCT is a beyond-birthday-bound (BBB) deterministic authenticated encryption (DAE) mode proposed by Forler et al. in ACISP 2016, ensuring integrity by redundancy. The instantiation of DCT employs the BRW polynomial, which is more efficient than the us
Externí odkaz:
https://doaj.org/article/0c2762feb6ac4c9589a747b284b6ba0e
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.