On modes of operations of a block cipher for authentication and authenticated encryption
D Chakraborty, P Sarkar - Cryptography and Communications, 2016 - Springer
This work deals with the various requirements of encryption and authentication in
cryptographic applications. The approach is to construct suitable modes of operations of a …
cryptographic applications. The approach is to construct suitable modes of operations of a …
An aead cryptographic framework and tinyaead construct for secure wsn communication
AA Adekunle, SR Woodhead - 2012 Wireless Advanced (WiAd …, 2012 - ieeexplore.ieee.org
A new cryptographic framework called Joint Cypher Mode (JCM) is introduced. JCM
provides an authenticated-encryption with associated data (AEAD) cryptographic service in …
provides an authenticated-encryption with associated data (AEAD) cryptographic service in …
[PDF][PDF] Implementation of EAX Mode of Operation within a Real-Time Android Chatting Application
L Ertaul, NV Konda… - Proceedings of the …, 2016 - borg.csueastbay.edu
SMS has been a widely used data application till today, availing two-end users to share any
information traditionally. Android chatting application helps the users to send and receive …
information traditionally. Android chatting application helps the users to send and receive …
Secure physical system design leveraging PUF technology
ST Kerr - 2012 - search.proquest.com
Physical systems are becoming increasingly computationally powerful as faster
microprocessors are installed. This allows many types of applications and functionality to be …
microprocessors are installed. This allows many types of applications and functionality to be …