Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
A survey on cryptographic techniques for protecting big data security: present and forthcoming
S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …
and provide novel ways of exploring the world. As they significantly create economic and …
The Deoxys AEAD Family
We present the Deoxys family of authenticated encryption schemes, which consists of
Deoxys-I and Deoxys-II. Both are nonce-based authenticated encryption schemes with …
Deoxys-I and Deoxys-II. Both are nonce-based authenticated encryption schemes with …
Duel of the titans: The Romulus and Remus families of lightweight AEAD algorithms
In this article, we propose two new families of very lightweight and efficient authenticated
encryption with associated data (AEAD) modes, Romulus and Remus, that provide security …
encryption with associated data (AEAD) modes, Romulus and Remus, that provide security …
Improved masking for tweakable blockciphers with applications to authenticated encryption
A popular approach to tweakable blockcipher design is via masking, where a certain
primitive (a blockcipher or a permutation) is preceded and followed by an easy-to-compute …
primitive (a blockcipher or a permutation) is preceded and followed by an easy-to-compute …
Alzette: A 64-Bit ARX-box: (Feat. CRAX and TRAX)
S-boxes are the only source of non-linearity in many symmetric primitives. While they are
often defined as being functions operating on a small space, some recent designs propose …
often defined as being functions operating on a small space, some recent designs propose …
Security of symmetric primitives under incorrect usage of keys
We study the security of symmetric primitives under the incorrect usage of keys. Roughly
speaking, a key-robust scheme does not output ciphertexts/tags that are valid with respect to …
speaking, a key-robust scheme does not output ciphertexts/tags that are valid with respect to …
TEDT, a leakage-resist AEAD mode for high physical security applications
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode
leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features:(i) It …
leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features:(i) It …
ZMAC: a fast tweakable block cipher mode for highly secure message authentication
We propose a new mode of operation called ZMAC allowing to construct a (stateless and
deterministic) message authentication code (MAC) from a tweakable block cipher (TBC) …
deterministic) message authentication code (MAC) from a tweakable block cipher (TBC) …
Tight security of TNT and beyond: Attacks, proofs and possibilities for the cascaded LRW paradigm
Abstract Liskov, Rivest and Wagner laid the theoretical foundations for tweakable block
ciphers (TBC). In a seminal paper, they proposed two (up to) birthday-bound secure design …
ciphers (TBC). In a seminal paper, they proposed two (up to) birthday-bound secure design …