Secure storage—Confidentiality and authentication
R Benadjila, L Khati, D Vergnaud - Computer Science Review, 2022 - Elsevier
Secure disk storage is a rich and complex topic and its study is challenging in theory as well
as in practice. In case of loss or theft of mobile devices (such as laptops and smartphones) …
as in practice. In case of loss or theft of mobile devices (such as laptops and smartphones) …
ELmD: A pipelineable authenticated encryption and its hardware implementation
Authenticated encryption schemes which resist misuse of nonce at some desired level of
privacy are two-pass or Mac-then-Encrypt constructions (inherently inefficient but provide full …
privacy are two-pass or Mac-then-Encrypt constructions (inherently inefficient but provide full …
Efficient and reliable error detection architectures of Hash-Counter-Hash tweakable enciphering schemes
M Mozaffari-Kermani, R Azarderakhsh… - ACM Transactions on …, 2018 - dl.acm.org
Through pseudorandom permutation, tweakable enciphering schemes (TES) constitute
block cipher modes of operation which perform length-preserving computations. The state-of …
block cipher modes of operation which perform length-preserving computations. The state-of …
FAST: disk encryption and beyond
D Chakraborty, S Ghosh, CM López… - Cryptology ePrint …, 2017 - eprint.iacr.org
This work introduces\sym {FAST} which is a new family of tweakable enciphering schemes.
Several instantiations of\sym {FAST} are described. These are targeted towards two goals …
Several instantiations of\sym {FAST} are described. These are targeted towards two goals …
Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
Block-cipher-based authenticated encryption has obtained considerable attention from the
ongoing CAESAR competition. While the focus of CAESAR resides primarily on nonce …
ongoing CAESAR competition. While the focus of CAESAR resides primarily on nonce …
Universal Context Commitment without Ciphertext Expansion
A Bhattacharjee, R Bhaumik, C Dhar - Cryptology ePrint Archive, 2024 - eprint.iacr.org
An ongoing research challenge in symmetric cryptography is to design an authenticated
encryption (AE) with a commitment to the secret key or preferably to the entire context. One …
encryption (AE) with a commitment to the secret key or preferably to the entire context. One …
Fast Low Level Disk Encryption Using FPGAs
D Chakraborty, S Ghosh, C Mancillas-Lopez… - arXiv preprint arXiv …, 2024 - arxiv.org
A fixed length tweakable enciphering scheme (TES) is the appropriate cryptographic
functionality for low level disk encryption. Research on TES over the last two decades have …
functionality for low level disk encryption. Research on TES over the last two decades have …
Pipelined hardware implementation of COPA, ELmD, and COLM
L Bossuet, C Mancillas-López… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Authenticated encryption algorithms offer privacy, authentication, and data integrity, as well.
In recent years, they have received special attention after the call for submissions of …
In recent years, they have received special attention after the call for submissions of …
Analisis Forensik Digital Memori Volatile untuk Mendapatkan Kunci Enkripsi Aplikasi Dm-Crypt
VAH Firdaus, D Suprianto… - Jurnal Sistem …, 2021 - ejurnal.stmik-budidarma.ac.id
Teknologi enkripsi disk merupakan teknologi yang sangat bermanfaat dalam mengamankan
data. Di sisi lain, enkripsi disk juga dapat digunakan oleh pelaku kejahatan untuk …
data. Di sisi lain, enkripsi disk juga dapat digunakan oleh pelaku kejahatan untuk …
[PDF][PDF] Authenticated and resilient disk encryption
M Brož - 2018 - is.muni.cz
Abstract Full Disk Encryption (FDE) is a security feature that is present in many systems–
from mobile devices to encrypted data in the cloud. Transparent onthe-fly encryption of …
from mobile devices to encrypted data in the cloud. Transparent onthe-fly encryption of …