Filters








17 Hits in 4.3 sec

INT-RUP Secure Lightweight Parallel AE Modes

Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki
2020 IACR Transactions on Symmetric Cryptology  
Both these modes are fully parallelizable and provide full integrity security under the RUP model.  ...  These modes achieve notably higher AE security bounds with lighter primitives (only a 64-bit tweakable block cipher).  ...  Nilanjan Datta, Ashwin Jha and Mridul Nandi are supported by the project "Study and Analysis of IoT Security" under Government of India at R.C.Bose Centre for Cryptology and Security, Indian Statistical  ... 
doi:10.46586/tosc.v2019.i4.81-118 fatcat:xqueqx4ib5ft7m27fuctklyi2q

INT-RUP Secure Lightweight Parallel AE Modes

Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki
2020 IACR Transactions on Symmetric Cryptology  
Both these modes are fully parallelizable and provide full integrity security under the RUP model.  ...  These modes achieve notably higher AE security bounds with lighter primitives (only a 64-bit tweakable block cipher).  ...  Nilanjan Datta, Ashwin Jha and Mridul Nandi are supported by the project "Study and Analysis of IoT Security" under Government of India at R.C.Bose Centre for Cryptology and Security, Indian Statistical  ... 
doi:10.13154/tosc.v2019.i4.81-118 dblp:journals/tosc/ChakrabortiDJMN19 fatcat:trudscswmraftckosxshesulaq

RUP Security of the SAEF Authenticated Encryption mode [article]

Elena Andreeva, Amit Singh Bhati, Damian Vizár
2021 IACR Cryptology ePrint Archive  
RUP security is a particularly relevant security target for lightweight (LW) implementations of AE schemes on memory-constrained devices or devices with stringent real-time requirements.  ...  Our INT-RUP proof is conducted using the coefficient H technique and it shows that, without any modifications, SAEF is INT-RUP secure up to the birthday bound, i.e., up to 2 n/2 processed data blocks,  ...  Among the 32 candidates in the second round of the NIST lightweight competition there are only 6 AE modes (including SAEF) that come with claims above the conventional nAE security.  ... 
dblp:journals/iacr/AndreevaBV21 fatcat:fjnxe6d3uzcldgfubsuwf5sqhy

Authenticated Encryption Schemes: A Systematic Review

Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Mat Kiah, Mohd Yamani Idna Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad
2022 IEEE Access  
Our analysis reveals that a significant outstanding challenge in AE is to balance security, efficiency, and the provision of desirable features.  ...  A total of 217 articles, selected from eight sources, were categorized into independent schemes, CAESAR competition schemes, and NIST lightweight competition schemes.  ...  misuse Resist Lightweight BBB security RUP security A-CEASAR WINNERS COLM BC EME aes Earned his bachelor's degree in Information Technology from SIMAD University, Mogadishu, Somalia, his master's degree  ... 
doi:10.1109/access.2022.3147201 fatcat:cybzrqntvrafnf5craphdsh7ve

Fast Decryption: a New Feature of Misuse-Resistant AE

Kazuhiko Minematsu
2020 IACR Transactions on Symmetric Cryptology  
Misuse-resistant AE (MRAE) is a class of authenticated encryption (AE) that has a resistance against a potential misuse (repeat) of nonce.  ...  This implies that MRAE built on SIV is slower than the integrated nonce-based AE schemes, such as OCB. In this paper, we propose a new method to improve this situation.  ...  This implies that we can use an INT-RUP-secure NAE scheme for DFV1 to ensure the whole INT-RUP security.  ... 
doi:10.13154/tosc.v2020.i3.87-118 dblp:journals/tosc/Minematsu20 fatcat:kscmodqwhneclahwgthlveby4a

The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes

Arghya Bhattacharjee, Cuauhtemoc Mancillas López, Eik List, Mridul Nandi
2021 Journal of Mathematical Cryptology  
We prove its security under nonce-respecting and Int-RUP adversaries. We show that our Int-RUP bound is tight and show general attacks on previous constructions.  ...  Permutation-based modes have been established for lightweight authenticated encryption, as can be seen from the high interest in the ongoing NIST lightweight competition.  ...  Acknowledgement: We thank Raghvendra Rohit and Sumanta Sarkar for their observation on the NIST lightweight mailing list [59] , as well as the anonymous reviewers of the Journal of Mathematical Cryptology  ... 
doi:10.1515/jmc-2020-0018 fatcat:i4bgdxscfbcb7hju5p7ihoyomy

General classification of the authenticated encryption schemes for the CAESAR competition

Farzaneh Abed, Christian Forler, Stefan Lucks
2016 Computer Science Review  
The "Galois Counter Mode" (GCM) [100] is a two-pass mode based on a block cipher.  ...  CAESAR (the Competition for Authenticated Encryption: Security, Applicability, and Robustness) contest aims at filling this gap for AE.  ...  Then, the INT-RUP advantage of a computationally bounded adversary A that never queries E K → V K ,for Π is defined as Adv INT-RUP Π (A) := Pr A E K ,D K ,V K forges , where the probability is defined  ... 
doi:10.1016/j.cosrev.2016.07.002 fatcat:rm4lscpp7nghvioil4kljpfku4

An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security

Wajih El Hadj Youssef, Ali Abdelli, Fethi Dridi, Rim Brahim, Mohsen Machhout, Ricardo Chaves
2022 Security and Communication Networks  
Firstly, efficient lightweight cipher designs are elaborated and validated.  ...  A single instruction is needed to implement a full lightweight cryptographic instruction.  ...  Inte Inte Inte Inte nt Inte Inte t I t nt Inte Inte Inte n nt In nt te Int rrup rrup ru rrup up up rrup rrup rrup rr rrup ru rup rrup rru rup rrup up r pt t t t t t t t t t 3-Port Regfile MUL32 7-Stage  ... 
doi:10.1155/2022/9709601 fatcat:jwpnxxezuvg2bjeqvt233pdveq

Nonce-Misuse Security of the SAEF Authenticated Encryption mode [article]

Elena Andreeva, Amit Singh Bhati, Damian Vizár
2020 IACR Cryptology ePrint Archive  
SAEF was proven AE secure against nonce-respecting adversaries.  ...  SAEF is a sequential and online AEAD that minimizes the memory footprint compared to its alternative parallel mode PAEF, catering to the most constrained devices.  ...  through FWO Project G.0835.16 A security Architecture for IoT.  ... 
dblp:journals/iacr/AndreevaBV20 fatcat:5mf3whpa4jaqfn643hzzrbldjm

Semantic agent-based controls for Service Oriented Architecture (SOA) enabled Intelligent Transportation Systems (ITS)

Shoaib Kamran, Olivier C L Haas
2011 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC)  
The database and the data transaction over the air (GPRS/3G) is fully encrypted using AES-128 level encryption for high security.  ...  in default mode or in agent-logic mode.  ...  Security Layer The Connectivity layer contains Authorisation and authentication features. It also provides encryption using AES 128 encryption.  ... 
doi:10.1109/itsc.2011.6083112 dblp:conf/itsc/KamranH11 fatcat:5mulhguh3jcbhjlxucwderdfou

Provably Secure Authenticated Encryption

Damian Vizár
2018
The security goals of AE (such as NAE, MRAE, OAE, RAE or the RUP) were captured in formal definitions in the tradition provable security, where the security of a scheme is formally proven assuming the  ...  Numerous AE schemes were designed; in the early years, these were almost exclusively blockcipher modes of operation, most notably OCB in 2001, CCM in 2003 and GCM in 2004.  ...  Security notions prompted by the discussions around the start of CAESAR competition were the Robust AE security [HKR15] and the security of AE under the release of unverified plaintext (RUP) [ABL + 14a  ... 
doi:10.5075/epfl-thesis-8681 fatcat:lnmf4nr3xjdfzdf3l6x5dmzhia

Editorial: Early aspects: aspect-oriented requirements engineering and architecture design

Awais Rashid, Ana Moreira, Bedir Tekinerdogan
2004 IEE Proceedings - Software  
| ae.participant = c)->forAll(ae | A.allConnections->select(AE | AE.participant = self) ->includes(AE | AE.matchesAssociationEnd(ae) and a.allConnections->select(ae | ae.participant <> c) ->forAll(ae2  ...  The lightweight characteristics make these processes easy-to-follow and agile.  ... 
doi:10.1049/ip-sen:20041027 fatcat:zqxbrgz225c2djhxm72y7s754i

CERAMIC ABSTRACTS

1958 Journal of The American Ceramic Society  
INT (Inst. nacl. tecnol.)  ...  INT (Inst. nacl. tecnol.)  ... 
doi:10.1111/j.1151-2916.1958.tb12889.x fatcat:ovpizmmwnrh55fpc5k3tkksx7e

CARS 2016—Computer Assisted Radiology and Surgery Proceedings of the 30th International Congress and Exhibition Heidelberg, Germany, June 21–25, 2016

2016 International Journal of Computer Assisted Radiology and Surgery  
The tilt-based direct scrolling was the fastest mode in average and, except for one user, also the fastest mode for each single user.  ...  The proposed approach implements data security by means of CT anonymisation and secure transfer protocol (https), and avoids all the issues related to the software deployment on a distributed environment  ... 
doi:10.1007/s11548-016-1412-5 pmid:27206418 fatcat:uk5r46n2xvhedkfjzmeiweyneq

An agile design methodology for portal solutions in future supply chain communities

Peter Treverton Galligan
2022
Wolak (2001) explains that RUP is a process framework and can be usedeither in a traditional (e.g. waterfall) manner orin a lightweight manner.  ...  Furthermore, the modelis applicable where developmentlife cycles are short.  ... 
doi:10.17638/03146573 fatcat:gutodzlhavcsbjj2ddbomqxgme
« Previous Showing results 1 — 15 out of 17 results