A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is application/pdf
.
Filters
On the Security of the CCM Encryption Mode and of a Slight Variant
[chapter]
Applied Cryptography and Network Security
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. ...
CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication scheme with the counter mode of encryption. It is used in several standards. ...
Acknowledgment This work has been partially supported by the European Commission through the IST Program under Contract IST-2002-507932 ECRYPT. ...
doi:10.1007/978-3-540-68914-0_25
dblp:conf/acns/FouqueMVZ08
fatcat:colthyvgtzaepbfikz75y3wpc4
Low-Power IoT Communication Security: On the Performance of DTLS and TLS 1.3
[article]
2020
arXiv
pre-print
Similarly to elsewhere on the Internet, practical security in the Internet of Things (IoT) is achieved by combining an array of mechanisms, at work at all layers of the protocol stack, in system software ...
Recently, the TLS 1.3 standard was released and DTLS 1.3 is in the final stages of standardization. ...
This mode harmonizes three PSK variants available in previous TLS versions into one. ...
arXiv:2011.12035v2
fatcat:vgyt4pnrjndjdnohasz3vjlvh4
IPSec: Performance Analysis in IPv4 and IPv6
2019
Journal of ICT Standardization
In this paper we present a throughput performance analysis of IPSec protocol, for both IPv4 and IPv6, using various cryptographic algorithms as recommended in the standards [13] . ...
In this study we have considered only throughput performance for authenticated encryption algorithms AES-GCM and AES-CCM, encryption algorithms AES-CBC, AES-CTR, and 3DES, and authentication algorithms ...
Table 2 2 ESP Authenticated Encryption (Combined Mode Algorithms) Requirement Authenticated Encryption Algorithm
SHOULD+
AES-GCM with a 16 octet ICV [RFC4106]
MAY
AES-CCM [RFC4309]
Table 3 ESP ...
doi:10.13052/jicts2245-800x.714
fatcat:izvvzsxvpzgp3fnedrwvbfc4pq
Authenticated Encryption Based on Chaotic Neural Networks and Duplex Construction
2021
Symmetry
The experimental results obtained on the security performance of the proposed AEADS system are notable and the proposed system can then be used to protect data and authenticate their sources. ...
In this paper, we propose, implement and analyze an Authenticated Encryption with Associated Data Scheme (AEADS) based on the Modified Duplex Construction (MDC) that contains a chaotic compression function ...
At its core, Oribatida, a variant of the MonkeyWrap AE mode, extended by a
ciphertext masking that boosts the security, inherits the minimal security ...
doi:10.3390/sym13122432
fatcat:frwiostg4factit4fqwaiht7ge
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
[chapter]
2014
Lecture Notes in Computer Science
When it is realized with a blockcipher, it requires one blockcipher call to process one input block (i.e. rate-1), and uses the encryption function of the blockcipher for both encryption and decryption ...
This paper proposes a new scheme for authenticated encryption (AE) which is typically realized as a blockcipher mode of operation. ...
The author would like to thank anonymous reviewers for careful reading and invaluable suggestions, which greatly improved the presentation of the paper. ...
doi:10.1007/978-3-642-55220-5_16
fatcat:vyv577v3ong4hokfyqzvrdsyzu
Twine: An Embedded Trusted Runtime for WebAssembly
[article]
2021
arXiv
pre-print
In particular, we used Twine to implement a secure, trusted version of SQLite, a well-known full-fledged embeddable database. ...
We evaluate Twine with a large set of general-purpose benchmarks and real-world applications. ...
ACKNOWLEDGMENTS This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No ...
arXiv:2103.15860v1
fatcat:4k2flfy6qbab7lw3ahxkdbl7ki
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
[chapter]
2016
Lecture Notes in Computer Science
To the best of our knowledge, this is the first authenticated encryption mode that provides at the same time close-to-optimal security in the noncerespecting scenario and birthday-bound security for the ...
The SCT mode combines in a SIV-like manner a Wegman-Carter MAC inspired from PMAC for the authentication part and a new counter-like mode for the encryption part, with the unusual property that the counter ...
Acknowledgements The authors would like to thank Jérémy Jean and Ivica Nikolic for their remarks on early designs. ...
doi:10.1007/978-3-662-53018-4_2
fatcat:h3vjushdvbeazfe4nuk6doeupq
Suit up! -- Made-to-Measure Hardware Implementations of ASCON
2015
2015 Euromicro Conference on Digital System Design
Having ciphers that provide confidentiality and authenticity, that are fast in software and efficient in hardware, these are the goals of the CAESAR authenticated encryption competition. ...
to encrypt a Gigabit Ethernet connection. ...
This work has been supported by the FFG research program SeCoS (project number 836628), the European Commission through the FP7 program (project MATTHEW, project number 610436), and by the Austrian Science ...
doi:10.1109/dsd.2015.14
dblp:conf/dsd/GrossWDE15
fatcat:6tf3p7t4hzcrrf6o2n6skyj7wu
CLOC: Authenticated Encryption for Short Input
[chapter]
2015
Lecture Notes in Computer Science
CLOC uses a variant of CFB mode in its encryption part and a variant of CBC MAC in the authentication part. ...
We define and analyze the security of a blockcipher mode of operation, CLOC, for provably secure authenticated encryption with associated data. ...
We have (18) = 1/2 n from the randomness of HASH4 ′′ , and (19) ≤ mm ′ /2 n + max{m, m ′ }/2 n from Lemma 5. We now evaluate the probability of the bad event. ...
doi:10.1007/978-3-662-46706-0_8
fatcat:lbofajfihvgvbarwr6k7u3hgh4
A framework for secure execution of software
2004
International Journal of Information Security
This solution, called SmartProt, is based on the use of smart cards and cryptographic techniques, and its security relies only on the first of previous premises; that is, Smartprot has been designed to ...
This type of solutions depends on two basic premises: (i) to increase the physical security by using tamperproof devices, and (ii) to increase the complexity of the analysis of the software. ...
In this sense, the XSCD infrastructure [16] [30] is based on the dynamic creation of mobile software elements protected by a variant of SmartProt. ...
doi:10.1007/s10207-004-0048-6
fatcat:rgeihd3i3nfmdjfdfqdzqrv75q
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
[chapter]
2011
Lecture Notes in Computer Science
This paper provides a comprehensive treatment of the security of authenticated encryption (AE) in the presence of key-dependent data, considering the four variants of the goal arising from the choice of ...
We go on to give a key-dependent data treatment of the goal of misuse resistant AE. Implementations are provided and show that RHtE has small overhead. ...
S[c], C) + S[c + 1] mod 2 to get a concrete attack that is only a slight modification of the BRS one but is proven to work. ...
doi:10.1007/978-3-642-22792-9_35
fatcat:htwppgpbbbfwlezbpryvzccmbm
Two Efficient Fault-Based Attacks on CLOC and SILC
2017
Journal of Hardware and Systems Security
The designers of CLOC and SILC claimed n 2 -bit integrity security against nonce-reusing adversaries, where n is the blockcipher state size in bits. ...
In the case of SILC, the forgery can be done for almost any associated data and message, except some nominal restrictions on associated data along with a fixed nonce. ...
Acknowledgments Avik Chakraborti and Mridul Nandi are supported by the Centre of Excellence in Cryptology, Indian Statistical Institute, Kolkata. ...
doi:10.1007/s41635-017-0022-1
dblp:journals/jhss/RoyCCKMN17
fatcat:ytr7zw4ju5hmhffdsxjqnqxbsy
Hybrid Control of Digital Baker Map with Application to Pseudo-Random Number Generator
2021
Entropy
Three different control modes are investigated, and the influence of control parameter on the properties of the controlled system is discussed. ...
Dynamical degradation occurs when chaotic systems are implemented on digital devices, which seriously threatens the security of chaos-based cryptosystems. ...
Thus far, many secure communication systems have been proposed, including multimedia digital encryption [3] , data watermarking, synchronization security systems, and data hiding systems based on chaos ...
doi:10.3390/e23050578
pmid:34066750
fatcat:a5m6mak2rna2xktplyrlmbx4ci
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security
2020
IACR Transactions on Symmetric Cryptology
In this paper, we specify a new block cipher, Saturnin, and its usage in different modes to provide hashing and authenticated encryption in such a way that we can rigorously argue its security in the post-quantum ...
A simple answer to this problem is a compromise on the security level: through a weaker round function or a smaller number of rounds, the security level can be decreased in order to cheapen the implementation ...
They are also particularly grateful to Xavier Bonnetain for very helpful discussions and comments, and in particular for an invaluable remark detecting a weakness on a preliminary version of Saturnin. ...
doi:10.13154/tosc.v2020.is1.160-207
dblp:journals/tosc/CanteautDLNPPS20
fatcat:jbovqcc6k5gvtopwgxcmadggd4
Insights into the Issue of Deploying a Private LoRaWAN
2022
Sensors
and give a clear overview of the advantages and disadvantages of the private versus public approaches. ...
The last decade has transformed wireless access technologies and crystallized a new direction for the internet of things (IoT). ...
Data Availability Statement: All data are available on demand via corresponding author.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s22052042
pmid:35271189
pmcid:PMC8914651
fatcat:wbrspl5mgrhmvmrv2ug2fmet5a
« Previous
Showing results 1 — 15 out of 69 results