Show simple item record

dc.contributor.authorGligoroski, Danilo
dc.contributor.authorMihajloska, Hristina
dc.contributor.authorSamardjiska, Simona
dc.contributor.authorJacobsen, Håkon
dc.contributor.authorJensen, Rune Erlend
dc.contributor.authorEl-Hadedy, Mohamed
dc.date.accessioned2015-02-06T11:04:17Z
dc.date.accessioned2015-03-12T14:14:04Z
dc.date.available2015-02-06T11:04:17Z
dc.date.available2015-03-12T14:14:04Z
dc.date.issued2014
dc.identifier.citationBernsmed, Karin; Fischer-Hübner, Simone [Eds.] Secure IT Systems; 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings p. 110-128, Springer, 2014nb_NO
dc.identifier.isbn978-3-319-11599-3
dc.identifier.issn0302-9743
dc.identifier.urihttp://hdl.handle.net/11250/279065
dc.descriptionThe final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-11599-3_7nb_NO
dc.description.abstractIn today’s world of big data and rapidly increasing telecommunications, using secure cryptographic primitives that are parallelizable and incremental is becoming ever more important design goal. π-Cipher is parallel, incremental, nonce based authenticated encryption cipher with associated data. It is designed with the special purpose of providing confidentiality and integrity for big data in transit or at rest. It has, as an option, a secret part of the nonce which provides noncemisuse resistance. The design involves operations of several solid cryptographic concepts such as the Encrypt-then-MAC principle, the XOR MAC scheme and the two-pass sponge construction. It contains parameters that can provide the functionality of tweakable block ciphers for authenticated encryption of data at rest. The security of the cipher relies on the core permutation function based on ARX (Addition, Rotation and XOR) operations. π-Cipher offers several security levels ranging from 96 to 256 bits.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer International Publishingnb_NO
dc.relation.urihttp://link.springer.com/content/pdf/10.1007%2F978-3-319-11599-3_7.pdf
dc.titlePi-Cipher: Authenticated Encryption for Big Datanb_NO
dc.typeChapternb_NO
dc.date.updated2015-02-06T11:04:17Z
dc.source.pagenumber110-128nb_NO
dc.source.volume8788nb_NO
dc.source.journalLecture Notes in Computer Sciencenb_NO
dc.identifier.cristin1201381


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record