A Chaos-Based Authenticated Cipher with Associated Data
In recent years, there has been a rising interest in authenticated encryptionwith associated data (AEAD)which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and t...
| Main Authors: | Je, Sen Teh, Samsudin, Azman |
|---|---|
| Format: | Article |
| Published: |
Wiley
2017
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/36689/ |
Similar Items
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017)
by: Je, Sen Teh, et al.
Published: (2017)
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007)
by: Suwais, Khaled, et al.
Published: (2007)
Analysable Chaos-based Design Paradigms For Cryptographic Applications
by: Abba, Abubakar
Published: (2024)
by: Abba, Abubakar
Published: (2024)
Enhancing Svd-Based Image
Watermarking Strategies Based On
Digital Chaos
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022)
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022)
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)
by: Eid, Almazrooie Mishal
Published: (2018)
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009)
by: Mohammad A. Suwais, Khaled
Published: (2009)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Fast And Simple NEMO Authentication Via Random Number.
by: Tan, Tat Kin, et al.
Published: (2007)
by: Tan, Tat Kin, et al.
Published: (2007)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
by: Lee, Ting Rong
Published: (2021)
by: Lee, Ting Rong
Published: (2021)
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
by: Jin, , ATB, et al.
Published: (2004)
by: Jin, , ATB, et al.
Published: (2004)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Bio-discretization: Biometrics authentication featuring face data and tokenised random number
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Improving The Efficiency Of Sip
Authentication Based On The
Pre-Calculated Look-Up Table
by: Jaber, Aws Naser
Published: (2013)
by: Jaber, Aws Naser
Published: (2013)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
Leave-one-out authentication of persons using 40 Hz EEG oscillations
by: Ravi, , KVR, et al.
Published: (2005)
by: Ravi, , KVR, et al.
Published: (2005)
Generalized Scheme For Fractal Based Digital Signature (GFDS).
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007)
by: Enayah, Monther Rateb, et al.
Published: (2007)
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
A New Digital Signature Scheme Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
A New Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Technology Review: Image Enhancement, Feature Extraction and Template Protection of a Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2010)
by: Islam, Md. Rajibul, et al.
Published: (2010)
Stego Keys Performance on Feature Based Coding Method in Text Domain
by: Din, Roshidi, et al.
Published: (2017)
by: Din, Roshidi, et al.
Published: (2017)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012)
by: Samsudin, Azman
Published: (2012)
Associative Memory Based Image and Object Recognition by Quantum Holography
by: Loo, Chu Kiong, et al.
Published: (2004)
by: Loo, Chu Kiong, et al.
Published: (2004)
Two-Factor Cancelable Biometrics Authenticator
by: Pang, Ying Han, et al.
Published: (2007)
by: Pang, Ying Han, et al.
Published: (2007)
Data Transfer Management In Grid-Based Mass Storage Environment.
by: Sumari, Putra, et al.
Published: (2004)
by: Sumari, Putra, et al.
Published: (2004)
CSI 512 - DATA BASE MANAGEMENT SYSTEMS FEB 1999.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
CSI512 - Data Base Management Systems February 1999
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
Webcam Based Fingerprint Authentication for Personal Identification System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
A prediction-based neural network scheme for lossless data compression
by: Logeswaran, R.
Published: (2002)
by: Logeswaran, R.
Published: (2002)
Distributed Hierarchical IDS For MANET Over AODV+.
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
by: Pahlevanzadeh, Bahareh, et al.
Published: (2007)
Similar Items
-
A Chaos-Based Authenticated Cipher with Associated Data
by: Je, Sen Teh, et al.
Published: (2017) -
ECSC-128: New Stream Cipher Based On Elliptic Curve Discrete Logarithm Problem.
by: Suwais, Khaled, et al.
Published: (2007) -
Analysable Chaos-based Design Paradigms For Cryptographic Applications
by: Abba, Abubakar
Published: (2024) -
Enhancing Svd-Based Image
Watermarking Strategies Based On
Digital Chaos
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022) -
The Construction Of Quantum Block Cipher For Grover Algorithm
by: Eid, Almazrooie Mishal
Published: (2018)