Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,958,490 papers from all fields of science
Search
Sign In
Create Free Account
Authenticated encryption
Known as:
AEAD
, AE
, Encrypt-and-MAC
Expand
Authenticated Encryption (AE) or Authenticated Encryption with Associated Data (AEAD) is a form of encryption which simultaneously provides…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Application programming interface
Block cipher
Block cipher mode of operation
CWC mode
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
ADSR: Authenticated DSR
J. Tornos
,
J. Piles
,
J. L. Salazar
6th International Conference on Risks and…
2011
Corpus ID: 16475722
MANETs have two characteristics that make traditional routing protocols cannot be applied in a straightforward manner to achieve…
Expand
2010
2010
Secure health monitoring using medical wireless sensor networks
Pardeep Kumar
,
Young-Dong Lee
,
Hoon-Jae Lee
International Conference on Networked Computing…
2010
Corpus ID: 12643479
In this paper, we are addressing security requirements of health monitoring using medical sensor networks and proposed a secure…
Expand
2009
2009
Secure Convertible Authenticated Encryption Scheme Based on RSA
Tzong-Sun Wu
,
Han-Yu Lin
Informatica
2009
Corpus ID: 17385797
A convertible authenticated encryption (CAE) scheme is a better way to simultaneously provide cryptographic schemes with the…
Expand
2007
2007
Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption
S. Lim
,
Chuan-Chin Pu
,
Hyotaek Lim
,
Hoon-Jae Lee
IACR Cryptology ePrint Archive
2007
Corpus ID: 16288349
Sensor networks offer economically viable monitoring solutions for a wide variety of applications. In order to combat the…
Expand
2004
2004
Ring Authenticated Encryption: A New Type of Authenticated Encryption
Jiqiang Lv
,
K. Ren
,
Xiaofeng Chen
,
Kwangjo Kim
2004
Corpus ID: 16769442
By combining the two notations of ring signature and authenticated encryption to- gether, we introduce a new type of…
Expand
2004
2004
Instationäre Grenzflächenvorgänge zwischen mischbaren Flüssigkeiten
R. Brückner
SCIENCE NATURE
2004
Corpus ID: 41153035
P~diat. 6, 231 ( 1 9 4 9 ) . [25] LENNOX, :B.: Lancet 19601, No. 7114, 55. [26~ LENZ, W.: Acta genet, statist, reed. 9, 249 (t959…
Expand
Highly Cited
2000
Highly Cited
2000
Geometric distortion correction in image watermarking
M. Alghoniemy
,
A. Tewfik
Electronic imaging
2000
Corpus ID: 2579281
In this paper we report a novel method to estimate the scaling factor of a previously scaled watermarked image and the angle by…
Expand
1998
1998
Authenticated encryption scheme with (t, n) shared verification
Chien-Lung Hsu
,
Tzong-Chen Wu
1998
Corpus ID: 55670554
A new authenticated encryption scheme with (t, n) shared verification based on discrete logarithms is proposed. In the scheme any…
Expand
1969
1969
Bau und Funktion des Spindelapparats
R. Dietz
Die Naturwissenschaften
1969
Corpus ID: 41030189
215, 78 (1966). [20] FEOESE, A.: Immunochem. 5, 253 (I968). I21] CHANGEUX, J. P., ef al.: Biochem. 7, 53t (t968). [22] CvERHART…
Expand
1964
1964
Geomenotaktische Fehlorientierung bei Formica polyctena Förster
H. Markl
Zeitschrift für Vergleichende Physiologie
1964
Corpus ID: 22518065
Zusammenfassung1.Arbeiterinnen von Formica polyctena können auf geneigter oder senkrechter Lauffläche sowohl beim Sammeln von…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE