Skip to search formSkip to main contentSkip to account menu

Authenticated encryption

Known as: AEAD, AE, Encrypt-and-MAC 
Authenticated Encryption (AE) or Authenticated Encryption with Associated Data (AEAD) is a form of encryption which simultaneously provides… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Encryption was “need of the hour” when it was invented but with the progress of time researchers have shown that it is not very… 
2016
2016
AEZ encrypts by appending to the plaintext a fixed authentication block and then enciphering the resulting string with an… 
2012
2012
An authenticated encryption scheme allows a designated recipient to recover the message and then verify its authenticity while… 
2010
2010
Wireless sensor networks (WSNs) are an emerging technology and offers economically viable monitoring solution to many challenging… 
2008
2008
Privacy is a key concern in Location Based Applications (LBAs), especially due to their intensive use resource constrained… 
2007
2007
Sensor networks offer economically viable monitoring solutions for a wide variety of applications. In order to combat the… 
2005
2005
1. Die sogenannten interkalären ZellenFeyrters sind Bindegewebszellen, die mit den Strängen der vegetativen Endformation in… 
2005
2005
senkenden Wirkung des Trypsins. Naunyn-Schmiedeberg's Arch. exp. Path. Pharmak. 225. 369 (1955). 2~ W~:~LE, E., u. F. P~E~SSE… 
2001
2001
In this document we propose a new mode of operation for symmetric key block cipher algorithms. The main feature distinguishing… 
1964
1964
Zusammenfassung1.Arbeiterinnen von Formica polyctena können auf geneigter oder senkrechter Lauffläche sowohl beim Sammeln von…