View Document Preview and Link
Document Date: 2015-04-21 05:49:18 Open Document File Size: 806,30 KB Share Result on Facebook
City Delhi / / Company online AE / AdvAE AE / underlying AE / AEGIS / ExpAuth AE / / Country India / / Currency USD / / / Event Man-Made Disaster / / Facility Somitra Sanadhya Indraprastha Institute of Information Technology / / IndustryTerm probabilistic algorithm / crypto device / software/hardware / limited device / invalid operator / real world applications / decryption algorithm / time symmetric encryption algorithm / low memory devices / authenticated decryption algorithm / seed generation algorithm / limited memory devices / decryption protocol / tag verification algorithm / encryption algorithm / authenticated encryption algorithm / / Organization G8 / Memory Constrained Devices Megha Agrawal / Donghoon Chang / and Somitra Sanadhya Indraprastha Institute of Information Technology / IN V / G7 / M AC / / Person Ai / / Position arbiter / / Product CM / Sponge / / ProgrammingLanguage C / K / / Technology x0 Algorithm / authenticated decryption algorithm / encryption algorithm / Information Technology / block cipher / smart card / secret key / Decrypt-then-mask protocol / 1 Introduction Authenticated encryption / Verification The algorithm / tag verification algorithm / 1.1 Encryption The algorithm / Encryption / authenticated encryption algorithm / proposed algorithm / decryption protocol / Remotely keyed encryption / proposed Authenticated Encryption / Decryption using Decrypt-Then-Mask Protocol / high-bandwidth encryption / decryption algorithm / time symmetric encryption algorithm / seed generation algorithm / 2.2 Decrypt-Then-Mask Protocol / 2 2.1 Previous Work Remotely Keyed Authenticated Encryption / Conceal algorithm / authenticated encryption / stream cipher / / SocialTag