On modes of operations of a block cipher for authentication and authenticated encryption

D Chakraborty, P Sarkar - Cryptography and Communications, 2016 - Springer
This work deals with the various requirements of encryption and authentication in
cryptographic applications. The approach is to construct suitable modes of operations of a …

An aead cryptographic framework and tinyaead construct for secure wsn communication

AA Adekunle, SR Woodhead - 2012 Wireless Advanced (WiAd …, 2012 - ieeexplore.ieee.org
A new cryptographic framework called Joint Cypher Mode (JCM) is introduced. JCM
provides an authenticated-encryption with associated data (AEAD) cryptographic service in …

[PDF][PDF] Implementation of EAX Mode of Operation within a Real-Time Android Chatting Application

L Ertaul, NV Konda… - Proceedings of the …, 2016 - borg.csueastbay.edu
SMS has been a widely used data application till today, availing two-end users to share any
information traditionally. Android chatting application helps the users to send and receive …

Secure physical system design leveraging PUF technology

ST Kerr - 2012 - search.proquest.com
Physical systems are becoming increasingly computationally powerful as faster
microprocessors are installed. This allows many types of applications and functionality to be …