Zobrazeno 1 - 10
of 6 360
pro vyhledávání: '"message authentication code"'
Publikováno v:
PeerJ Computer Science, Vol 10, p e2249 (2024)
The key derivation function is a specific cryptographic algorithm that transforms private string and public strings into one or more cryptographic keys. The cryptographic keys are essential for protecting electronic data during transmission on the in
Externí odkaz:
https://doaj.org/article/e36c60a0bcfe4f9dbd98346be08ebb21
Autor:
Fajiang Yu, Yanting Huang
Publikováno v:
Symmetry, Vol 16, Iss 3, p 310 (2024)
Efficient safeguarding of the security of interconnected devices, which are often resource-constrained, can be achieved through collective remote attestation schemes. However, in existing schemes, the attestation keys are independent of the device co
Externí odkaz:
https://doaj.org/article/a79995eef2b34907924b732203a95c64
Autor:
Anastasios Papathanasiou, George Liontos, Georgios Paparis, Vasiliki Liagkou, Euripides Glavas
Publikováno v:
Sensors, Vol 24, Iss 5, p 1676 (2024)
In an era of ever-evolving and increasingly sophisticated cyber threats, protecting sensitive information from cyberattacks such as business email compromise (BEC) attacks has become a top priority for individuals and enterprises. Existing methods us
Externí odkaz:
https://doaj.org/article/8671793516624da98b315ba15496de2e
Autor:
Mohamud Ahmed Jimale, Nor Aniza Abdullah, Miss Laiha Binti Mat Kiah, Mohd Yamani Idna Idris, Muhammad Reza Z'Aba, Norziana Jamil, Mohd Saufy Rohmad
Publikováno v:
IEEE Access, Vol 11, Pp 59661-59674 (2023)
Authenticated Encryption (AE) protects confidentiality and integrity at the same time. The sponge construction is based on an iterated permutation or transformation that can be used to implement hashing, and AE schemes, among others. Sponge-based AE
Externí odkaz:
https://doaj.org/article/0118df0868234f19907ade789f54eeb2
Publikováno v:
IEEE Access, Vol 10, Pp 112472-112486 (2022)
In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of the data, in forensic investigati
Externí odkaz:
https://doaj.org/article/7f45e19a15f14e7290f33e7035b7d6ec
Autor:
Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Binti Mat Kiah, Mohd Yamani Idna Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad
Publikováno v:
IEEE Access, Vol 10, Pp 14739-14766 (2022)
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000. Different lines of research h
Externí odkaz:
https://doaj.org/article/538616fd19fd45fa9f9a74388974a766
Autor:
Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Binti Mat Kiah, Mohd Yamani Idna Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad
Publikováno v:
IEEE Access, Vol 10, Pp 50819-50838 (2022)
Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance. The Block cipher was the dominant primitive in constructing AE schemes, followed by s
Externí odkaz:
https://doaj.org/article/e725c638c5524658865953402490d6f7
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.