We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 437 results
  1. CAESAR: concept augmentation based semantic representation for cross-modal retrieval

    With the increasing amount of multimedia data, cross-modal retrieval has attracted more attentions in the area of multimedia and computer vision. To...

    Lei Zhu, Jiayu Song, ... Jun Long in Multimedia Tools and Applications
    Article 30 October 2020
  2. The COLM Authenticated Encryption Scheme

    In this work we present the COLM authenticated encryption (AE) scheme which is the second of the two winners in the defense in depth category of the...

    Elena Andreeva, Andrey Bogdanov, ... Kan Yasuda in Journal of Cryptology
    Article 07 March 2024
  3. Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition

    The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) supported by the National Institute of Standards and...

    Fan Zhang, Zi-yuan Liang, ... Kui Ren in Frontiers of Information Technology & Electronic Engineering
    Article 01 December 2018
  4. Ascon v1.2: Lightweight Authenticated Encryption and Hashing

    Authenticated encryption satisfies the basic need for authenticity and confidentiality in our information infrastructure. In this paper, we provide...

    Christoph Dobraunig, Maria Eichlseder, ... Martin Schläffer in Journal of Cryptology
    Article Open access 22 June 2021
  5. Differential Random Fault Attacks on Certain CAESAR Stream Ciphers

    We show that a particular class of stream ciphers – namely those in which the output function contains a bitwise AND operation – are susceptible to a...
    Kenneth Koon-Ho Wong, Harry Bartlett, ... Ed Dawson in Information Security and Cryptology – ICISC 2019
    Conference paper 2020
  6. Post-quantum Security of Tweakable Even-Mansour, and Applications

    The tweakable Even-Mansour construction yields a tweakable block cipher from a public random permutation. We prove post-quantum security of tweakable...
    Gorjan Alagic, Chen Bai, ... Patrick Struck in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  7. The Deoxys AEAD Family

    We present the Deoxys family of authenticated encryption schemes, which consists of Deoxys-I and Deoxys-II . Both are nonce-based authenticated...

    Jérémy Jean, Ivica Nikolić, ... Yannick Seurin in Journal of Cryptology
    Article 10 June 2021
  8. Cryptographic Competitions

    Competitions are widely viewed as the safest way to select cryptographic algorithms. This paper surveys procedures that have been used in...

    Daniel J. Bernstein in Journal of Cryptology
    Article Open access 08 December 2023
  9. Exact Security Analysis of ASCON

    The Ascon cipher suite, offering both authenticated encryption with associated data (AEAD) and hashing functionality, has recently emerged as the...
    Bishwajit Chakraborty, Chandranan Dhar, Mridul Nandi in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  10. Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery

    In this paper, we analyze the security of authenticated encryption modes OTR (Minematsu, Eurocrypt 2014) and OPP (Granger et al., Eurocrypt 2016) in...
    Melanie Jauch, Varun Maram in Selected Areas in Cryptography – SAC 2023
    Conference paper 2024
  11. Sycon: a new milestone in designing ASCON-like permutations

    ASCON is one of the elegant designs of authenticated encryption with associated data (AEAD) that was selected as the first choice for lightweight...

    Kalikinkar Mandal, Dhiman Saha, ... Yosuke Todo in Journal of Cryptographic Engineering
    Article 08 October 2021
  12. Strengthening ACORN Authenticated Cipher with Cellular Automata

    The authenticated encryption (AE) scheme ACORN v3, a CAESAR competition finalist, has been shown to be particularly vulnerable against Differential...
    Jossy Joseph, Joseph Jacob, ... Jimmy Jose in Cellular Automata
    Conference paper 2021
  13. Differential fault analysis of NORX using variants of coupon collector problem

    In this paper, we report the first DFA on nonce-based CAESAR scheme NORX (applicable to all the versions v1, v2.0, v3.0). This demonstrates a...

    Amit Jana, Anirban Nath, ... Dhiman Saha in Journal of Cryptographic Engineering
    Article 05 March 2022
  14. Experimentally Obtained Differential-Linear Distinguishers for Permutations of ASCON and DryGASCON

    DryGASCON and Ascon are two similar authenticated encryption algorithms submitted to NIST’s recently finalized lightweight cryptography competition....
    Aslı Başak Civek, Cihangir Tezcan in Information Systems Security and Privacy
    Conference paper 2023
  15. Challenges as catalysts: how Waymo’s Open Dataset Challenges shape AI development

    Artificial intelligence (AI) and machine learning (ML) are becoming increasingly significant areas of research for scholars in science and technology...

    Sam Hind, Fernando N. van der Vlist, Max Kanderske in AI & SOCIETY
    Article Open access 17 April 2024
  16. Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security

    This paper proposes a lightweight authenticated encryption (AE) scheme, called Light-OCB, which can be viewed as a lighter variant of the CAESAR...
    Avik Chakraborti, Nilanjan Datta, ... Mridul Nandi in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2022
  17. High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform

    Authenticated encryption with associated data (AEAD) has become prominent over time because it offers authenticity and confidentiality...

    Jia-Lin Chan, Wai-Kong Lee, ... Bok-Min Goi in Cluster Computing
    Article 20 May 2024
  18. Generic Attack on Duplex-Based AEAD Modes Using Random Function Statistics

    Duplex-based authenticated encryption modes with a sufficiently large key length are proven to be secure up to the birthday bound...
    Henri Gilbert, Rachelle Heim Boissier, ... Yann Rotella in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  19. Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128

    We investigate a technique that needs to apply multiple random faults to the same target location and compare the impact of these faults on the...

    Iftekhar Salam, Wei-Chuen Yau, ... Josef Pieprzyk in Journal of Cryptographic Engineering
    Article 26 June 2023
  20. Can Caesar Beat Galois?

    The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as its official goal to “identify a portfolio of...
    Serge Vaudenay, Damian Vizár in Applied Cryptography and Network Security
    Conference paper 2018
Did you find what you were looking for? Share feedback.