Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,372,029 papers from all fields of science
Search
Sign In
Create Free Account
Authenticated encryption
Known as:
AEAD
, AE
, Encrypt-and-MAC
Expand
Authenticated Encryption (AE) or Authenticated Encryption with Associated Data (AEAD) is a form of encryption which simultaneously provides…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Application programming interface
Block cipher
Block cipher mode of operation
CWC mode
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Secure health monitoring using medical wireless sensor networks
Pardeep Kumar
,
Young-Dong Lee
,
Hoon-Jae Lee
International Conference on Networked Computing…
2010
Corpus ID: 12643479
In this paper, we are addressing security requirements of health monitoring using medical sensor networks and proposed a secure…
Expand
2009
2009
Secure Convertible Authenticated Encryption Scheme Based on RSA
Tzong-Sun Wu
,
Han-Yu Lin
Informatica
2009
Corpus ID: 17385797
A convertible authenticated encryption (CAE) scheme is a better way to simultaneously provide cryptographic schemes with the…
Expand
2009
2009
Authenticated Streamwise On-line Encryption
Patrick P. Tsang
,
Rouslan Solomakhin
,
Sean W. Smith
2009
Corpus ID: 6309922
In Blockwise On-line Encryption, encryption and decryption return an output block as soon as the next input block is received. In…
Expand
2007
2007
Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption
S. Lim
,
Chuan-Chin Pu
,
Hyotaek Lim
,
Hoon-Jae Lee
IACR Cryptology ePrint Archive
2007
Corpus ID: 16288349
Sensor networks offer economically viable monitoring solutions for a wide variety of applications. In order to combat the…
Expand
2005
2005
Die plexiforme Synapse auf Distanz und die Badeutung der sogenannten interkalären Zellen
D. V. Jabonero
Journal of Neuro-Visceral Relations
2005
Corpus ID: 21885039
1. Die sogenannten interkalären ZellenFeyrters sind Bindegewebszellen, die mit den Strängen der vegetativen Endformation in…
Expand
2004
2004
Ring Authenticated Encryption: A New Type of Authenticated Encryption
Jiqiang Lv
,
K. Ren
,
Xiaofeng Chen
,
Kwangjo Kim
2004
Corpus ID: 16769442
By combining the two notations of ring signature and authenticated encryption to- gether, we introduce a new type of…
Expand
Highly Cited
2000
Highly Cited
2000
Geometric distortion correction in image watermarking
M. Alghoniemy
,
A. Tewfik
Electronic imaging
2000
Corpus ID: 2579281
In this paper we report a novel method to estimate the scaling factor of a previously scaled watermarked image and the angle by…
Expand
1998
1998
Authenticated encryption scheme with (t, n) shared verification
Chien-Lung Hsu
,
Tzong-Chen Wu
1998
Corpus ID: 55670554
A new authenticated encryption scheme with (t, n) shared verification based on discrete logarithms is proposed. In the scheme any…
Expand
1992
1992
CO adsorption isotherms on Cu(100) at elevated pressures and temperatures using infrared reflection absorption spectroscopy
C. Truong
,
Jose A. Rodriguez
,
D. Goodman
1992
Corpus ID: 39302523
1969
1969
Bau und Funktion des Spindelapparats
R. Dietz
Die Naturwissenschaften
1969
Corpus ID: 41030189
215, 78 (1966). [20] FEOESE, A.: Immunochem. 5, 253 (I968). I21] CHANGEUX, J. P., ef al.: Biochem. 7, 53t (t968). [22] CvERHART…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required