Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,935,575 papers from all fields of science
Search
Sign In
Create Free Account
Authenticated encryption
Known as:
AEAD
, AE
, Encrypt-and-MAC
Expand
Authenticated Encryption (AE) or Authenticated Encryption with Associated Data (AEAD) is a form of encryption which simultaneously provides…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Application programming interface
Block cipher
Block cipher mode of operation
CWC mode
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
HS1-RIV: Improved Efficiency for Authenticated Encryption
A. Bhardwaj
,
S. Som
,
S. K. Muttoo
2018
Corpus ID: 196002549
Encryption was “need of the hour” when it was invented but with the progress of time researchers have shown that it is not very…
Expand
2016
2016
AEZ v 4 . 1 : Authenticated Encryption by Enciphering
U. Barbara
2016
Corpus ID: 16033262
AEZ encrypts by appending to the plaintext a fixed authentication block and then enciphering the resulting string with an…
Expand
2012
2012
Novel convertible authenticated encryption schemes without using hash functions
Xuhong Li
,
Wei Zhang
,
Xia Wang
,
Muhai Li
International Conference on Computer Science and…
2012
Corpus ID: 14228751
An authenticated encryption scheme allows a designated recipient to recover the message and then verify its authenticity while…
Expand
2010
2010
TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption
Pardeep Kumar
,
S. Cho
,
D. Lee
,
Young-Dong Lee
,
Hoon-Jae Lee
J. Inform. and Commun. Convergence Engineering
2010
Corpus ID: 10151355
Wireless sensor networks (WSNs) are an emerging technology and offers economically viable monitoring solution to many challenging…
Expand
2008
2008
The CURUPIRA-2 Block Cipher for Constrained Platforms: Specification and Benchmarking
M. Simplício
,
Paulo L. Barreto
,
T. Carvalho
,
C. Margi
,
M. Näslund
PiLBA
2008
Corpus ID: 6321797
Privacy is a key concern in Location Based Applications (LBAs), especially due to their intensive use resource constrained…
Expand
2007
2007
Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption
S. Lim
,
Chuan-Chin Pu
,
Hyotaek Lim
,
Hoon-Jae Lee
IACR Cryptology ePrint Archive
2007
Corpus ID: 16288349
Sensor networks offer economically viable monitoring solutions for a wide variety of applications. In order to combat the…
Expand
2005
2005
Die plexiforme Synapse auf Distanz und die Badeutung der sogenannten interkalären Zellen
D. V. Jabonero
Journal of Neuro-Visceral Relations
2005
Corpus ID: 21885039
1. Die sogenannten interkalären ZellenFeyrters sind Bindegewebszellen, die mit den Strängen der vegetativen Endformation in…
Expand
2005
2005
Führt die sog. osmotische Nephrose oder Zuckerspeicherniere zur Niereninsuffizienz?
H. Sarre
,
R. Knorr
Klinische Wochenschrift
2005
Corpus ID: 38327183
senkenden Wirkung des Trypsins. Naunyn-Schmiedeberg's Arch. exp. Path. Pharmak. 225. 369 (1955). 2~ W~:~LE, E., u. F. P~E~SSE…
Expand
2001
2001
Parallelizable Encryption Mode with Almost Free Message Integrity
C. Jutla
2001
Corpus ID: 650104
In this document we propose a new mode of operation for symmetric key block cipher algorithms. The main feature distinguishing…
Expand
1964
1964
Geomenotaktische Fehlorientierung bei Formica polyctena Förster
H. Markl
Zeitschrift für Vergleichende Physiologie
1964
Corpus ID: 22518065
Zusammenfassung1.Arbeiterinnen von Formica polyctena können auf geneigter oder senkrechter Lauffläche sowohl beim Sammeln von…
Expand