To see the other types of publications on this topic, follow the link: Counter Mode (GCM).

Journal articles on the topic 'Counter Mode (GCM)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 25 journal articles for your research on the topic 'Counter Mode (GCM).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kim, Kyungho, Seungju Choi, Hyeokdong Kwon, Hyunjun Kim, Zhe Liu, and Hwajeong Seo. "PAGE—Practical AES-GCM Encryption for Low-End Microcontrollers." Applied Sciences 10, no. 9 (2020): 3131. http://dx.doi.org/10.3390/app10093131.

Full text
Abstract:
An optimized AES (Advanced Encryption Standard) implementation of Galois Counter Mode of operation (GCM) on low-end microcontrollers is presented in this paper. Two optimization methods are applied to proposed implementations. First, the AES counter (CTR) mode of operation is speed-optimized and ensures constant timing. The main idea is replacing expensive AES operations, including AddRound Key, SubBytes, ShiftRows, and MixColumns, into simple look-up table access. Unlike previous works, the look-up table does not require look-up table updates during the entire encryption life-cycle. Second, t
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Ping, Hong-Gang Hu, and Qian Yuan. "Close to Optimally Secure Variants of GCM." Security and Communication Networks 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/9715947.

Full text
Abstract:
The Galois/Counter Mode of operation (GCM) is a widely used nonce-based authenticated encryption with associated data mode which provides the birthday-bound security in the nonce-respecting scenario; that is, it is secure up to about 2n/2 adversarial queries if all nonces used in the encryption oracle are never repeated, where n is the block size. It is an open problem to analyze whether GCM security can be improved by using some simple operations. This paper presents a positive response for this problem. Firstly, we introduce two close to optimally secure pseudorandom functions and derive the
APA, Harvard, Vancouver, ISO, and other styles
3

Kankara, Mahidhara Reddy. "Encrypted e-Voting System using IoT." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (2021): 453–60. http://dx.doi.org/10.22214/ijraset.2021.37973.

Full text
Abstract:
Abstract: Elections make a fundamental contribution to democratic governance but a lack of trust among citizens on their electoral system is a hindrance to satisfy the legal requirements of legislators. Even the world’s largest democratic countries suffer from issues like vote rigging, election manipulation and hacking of the electronic voting machines in the current voting system. To provide data security for e-Voting systems, the advanced encryption standard (AES) algorithm has been proposed, but traditional AES gives the same ciphertext for every similar pair of key and plaintext. So, to el
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Shuai, and Nicholas Hopper. "Mailet: Instant Social Networking under Censorship." Proceedings on Privacy Enhancing Technologies 2016, no. 2 (2016): 175–92. http://dx.doi.org/10.1515/popets-2016-0011.

Full text
Abstract:
Abstract Social media websites are blocked in many regimes where Internet censorship is applied. In this paper, we introduce Mailet, an unobservable transport proxy which enables the users to access social websites by email applications. Without assuming the Mailet servers are trustworthy, Mailet can support the services requiring privileges without having the complete credential. Particularly, the credential is split and distributed in two Mailet servers, and neither of them can recover the credential alone. To recover the credential in a TLS record message, we propose a highly efficient Galo
APA, Harvard, Vancouver, ISO, and other styles
5

Seo, Seog Chung, and Donggeun Kwon. "Highly Efficient SCA-Resistant Binary Field Multiplication on 8-Bit AVR Microcontrollers." Applied Sciences 10, no. 8 (2020): 2821. http://dx.doi.org/10.3390/app10082821.

Full text
Abstract:
Binary field ( B F ) multiplication is a basic and important operation for widely used crypto algorithms such as the GHASH function of GCM (Galois/Counter Mode) mode and NIST-compliant binary Elliptic Curve Cryptosystems (ECCs). Recently, Seo et al. proposed a novel SCA-resistant binary field multiplication method in the context of GHASH optimization in AES GCM mode on 8-bit AVR microcontrollers (MCUs). They proposed a concept of Dummy XOR operation with a kind of garbage registers and a concept of instruction level atomicity ( I L A ) for resistance against Timing Analysis (TA) and Simple Pow
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Zhun, Xiang Wang, Qiang Hao, et al. "High-Efficiency Parallel Cryptographic Accelerator for Real-Time Guaranteeing Dynamic Data Security in Embedded Systems." Micromachines 12, no. 5 (2021): 560. http://dx.doi.org/10.3390/mi12050560.

Full text
Abstract:
Dynamic data security in embedded systems is raising more and more concerns in numerous safety-critical applications. In particular, the data exchanges in embedded Systems-on-Chip (SoCs) using main memory are exposing many security vulnerabilities to external attacks, which will cause confidential information leakages and program execution failures for SoCs at key points. Therefore, this paper presents a security SoC architecture with integrating a four-parallel Advanced Encryption Standard-Galois/Counter Mode (AES-GCM) cryptographic accelerator for achieving high-efficiency data processing to
APA, Harvard, Vancouver, ISO, and other styles
7

Gudodagi, Raveendra, and R. Venkata Siva Reddy. "Security Provisioning and Compression of Diverse Genomic Data based on Advanced Encryption Standard (AES) Algorithm." International Journal of Biology and Biomedical Engineering 15 (May 14, 2021): 104–12. http://dx.doi.org/10.46300/91011.2021.15.14.

Full text
Abstract:
Compression of genomic data has gained enormous momentum in recent years because of advances in technology, exponentially growing health concerns, and government funding for research. Such advances have driven us to personalize public health and medical care. These pose a considerable challenge for ubiquitous computing in data storage. One of the main issues faced by genomic laboratories is the 'cost of storage' due to the large data file of the human genome (ranging from 30 GB to 200 GB). Data preservation is a set of actions meant to protect data from unauthorized access or changes. There ar
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Qiong, Anders Berglund, Dapeng Wang, et al. "GENE-46. XAF1 DRIVES DIFFERENTIAL PLASTICITY TOWARDS ADAPTIVE RESISTANCE BETWEEN MGMT-HYPERMETHYLATED AND MGMT-HYPOMETHYLATED GLIOBLASTOMA." Neuro-Oncology 21, Supplement_6 (2019): vi107. http://dx.doi.org/10.1093/neuonc/noz175.448.

Full text
Abstract:
Abstract Although, the epigenetic regulation of O6-alkylguanine DNA alkyltransferase (MGMT) in GBM is an established surrogate of intrinsic resistance to temozolomide (TMZ), the evolution of GBM habitats towards adaptive resistance to TMZ relative to MGMT promoter methylation status remains unclear. We report a novel epigenetic regulation of plasticity towards adaptive resistance in GBM. Using an adaptive TMZ resistance model of MGMT-hypermethylated and MGMT-hypomethylated GBM cellular habitats, a counter-intuitive inverse correlation was noted between intrinsic MGMT-dependent TMZ resistance v
APA, Harvard, Vancouver, ISO, and other styles
9

Svablova, T., N. Ternerova, M. Houdova Megova, P. Busek, and A. Sedo. "P10.01 Effect of mesenchymal cells on infiltration and phenotype of T cells in a 3D glioblastoma spheroid model." Neuro-Oncology 23, Supplement_2 (2021): ii27—ii28. http://dx.doi.org/10.1093/neuonc/noab180.094.

Full text
Abstract:
Abstract BACKGROUND Glioblastoma (GBM), the most malignant primary brain tumor with a median survival less than two years, is characterized by aggressive invasive growth, presence of hypoxic and necrotic regions, and T-cell dysfunction. Mesenchymal cells with characteristics of cancer associated fibroblasts are present in GBMs, but it remains to be established whether they contribute to T cell sequestration in the tumor stroma and functional inactivation similarly to extracranial tumors. Murine models do not reflect several aspects of human immune system and 2D cell culture systems often fail
APA, Harvard, Vancouver, ISO, and other styles
10

Nazarov, Vladimir, and Dmitry Afinogenov. "Global Climate Change as a National Security Threat: American and Russian Political Practices." Vestnik Volgogradskogo gosudarstvennogo universiteta. Serija 4. Istorija. Regionovedenie. Mezhdunarodnye otnoshenija 26, no. 1 (2021): 107–22. http://dx.doi.org/10.15688/jvolsu4.2021.1.10.

Full text
Abstract:
Introduction. The article gives an overview of American and Russian approaches to global climate change (GCC) in the context of the national security policy. The purpose of the study is to improve the national security policy in the context of GCC using international and Russian experience. The authors make proposals for refining Russian approaches to the problem including adjustments to the Russian Federation National Security Strategy, development of a number of other strategic planning documents and new initiatives to tackle threats related to GCC on a broad multilateral basis. Methods and
APA, Harvard, Vancouver, ISO, and other styles
11

Pál, Márton, and Gáspár Albert. "Comparison of geotourism assessment models: and experiment in Bakony–Balaton UNSECO Global Geopark, Hungary." Acta Geoturistica 9, no. 2 (2018): 1–13. http://dx.doi.org/10.1515/agta-2018-0005.

Full text
Abstract:
Abstract Geological and scenic values of locations are the non-living curiosities that can be preserved and popularized a lot easier using the institutional background of geotourism, such as geoparks. UNESCO Global Geoparks Network is responsible for protecting and fostering natural, scenic and cultural values and especially geosites that are the exciting visible physical elements. Our goal was to quantify the geotourism potential around Csopak, a scenic village in the Balaton Uplands giving home for the headquarter of the Bakony-Balaton UNESCO Global Geopark. After designating 216 potential g
APA, Harvard, Vancouver, ISO, and other styles
12

Saif-Alyousfi, Abdulazeez Y. H. "Determinants of bank shareholder value: evidence from GCC countries." International Journal of Managerial Finance 16, no. 2 (2019): 224–52. http://dx.doi.org/10.1108/ijmf-05-2019-0170.

Full text
Abstract:
Purpose The purpose of this paper is to examine the effect of bank specific, financial structure and macroeconomic factors on the shareholder value of banks in GCC economies during 2000–2017. Design/methodology/approach To estimate the model and analyze the data collected from the BankScope and World Bank World Development Indicator database, the author uses static panel estimation techniques as well as two-step difference and system dynamic generalized method of moments estimator. Findings The results show that banks that are highly dependent on non-traditional activities have higher sharehol
APA, Harvard, Vancouver, ISO, and other styles
13

Baigorria, Guillermo A., James W. Hansen, Neil Ward, James W. Jones, and James J. O’Brien. "Assessing Predictability of Cotton Yields in the Southeastern United States Based on Regional Atmospheric Circulation and Surface Temperatures." Journal of Applied Meteorology and Climatology 47, no. 1 (2008): 76–91. http://dx.doi.org/10.1175/2007jamc1523.1.

Full text
Abstract:
Abstract The potential to predict cotton yields up to one month before planting in the southeastern United States is assessed in this research. To do this, regional atmospheric variables that are related to historic summer rainfall and cotton yields were identified. The use of simulations of those variables from a global circulation model (GCM) for estimating cotton yields was evaluated. The authors analyzed detrended cotton yields (1970–2004) from 48 counties in Alabama and Georgia, monthly rainfall from 53 weather stations, monthly reanalysis data of 850- and 200-hPa winds and surface temper
APA, Harvard, Vancouver, ISO, and other styles
14

DE VRIESE, AN S., KARLHANS ENDLICH, MARLIES ELGER, et al. "The Role of Selectins in Glomerular Leukocyte Recruitment in Rat Anti-Glomerular Basement Membrane Glomerulonephritis." Journal of the American Society of Nephrology 10, no. 12 (1999): 2510–17. http://dx.doi.org/10.1681/asn.v10122510.

Full text
Abstract:
Abstract. Leukocytes play a central role in the pathogenesis of anti-glomerular basement membrane glomerulonephritis (anti-GBM GN). Understanding the mechanisms underlying their recruitment in the glomerulus is of critical importance, because this may lead to more specific anti-inflammatory drug design. The requirement for integrins, especially from the β2 group, and their Ig superfamily counter-receptors has been established, however, the role of selectins remains controversial. An intravital microscopy technique was developed to study concomitantly the glomerular and venular leukocyte kineti
APA, Harvard, Vancouver, ISO, and other styles
15

Liang, Yulian, Yongli Wang, Yinjun Zhao, Yuan Lu, and Xiaoying Liu. "Analysis and Projection of Flood Hazards over China." Water 11, no. 5 (2019): 1022. http://dx.doi.org/10.3390/w11051022.

Full text
Abstract:
Floods have been experienced with greater frequency and more severity under global climate change. To understand the flood hazard and its variation in the future, the current and future flood hazards in the 21st century in China are discussed. Floods and their trends are assessed using the accumulation precipitation during heavy rainfall process (AP_HRP), which are calculated based on historical meteorological observations and the outputs of a global climate model (GCM) under three Representative Concentration Pathway (RCP) scenarios. The flood-causing HRPs counted by the flood-causing critica
APA, Harvard, Vancouver, ISO, and other styles
16

Komjáth, P. "Morasses and the Lévy-collapse." Journal of Symbolic Logic 52, no. 1 (1987): 111–15. http://dx.doi.org/10.2307/2273865.

Full text
Abstract:
For several old problems in combinatorial set theory A. Hajnal and the present author [2] showed that on collapsing a sufficiently Mahlo cardinal to ω1 by the Lévy-collapse one gets a model where these problems are solved in the “counter-example” direction. The authors of [2] have speculated that the theorems of that paper should hold in L, and this, in fact, was shown for some of the results by Todorčević and Velleman [7,8]. The observation that collapsing a large cardinal to ω1 may give rise to L-like constructions is not new. As it was shown long ago by Silver and Rowbottom, there is a Kure
APA, Harvard, Vancouver, ISO, and other styles
17

Adede, Chrisgone, Robert Oboko, Peter Waiganjo Wagacha, and Clement Atzberger. "A Mixed Model Approach to Vegetation Condition Prediction Using Artificial Neural Networks (ANN): Case of Kenya’s Operational Drought Monitoring." Remote Sensing 11, no. 9 (2019): 1099. http://dx.doi.org/10.3390/rs11091099.

Full text
Abstract:
Droughts, with their increasing frequency of occurrence, especially in the Greater Horn of Africa (GHA), continue to negatively affect lives and livelihoods. For example, the 2011 drought in East Africa caused massive losses, documented to have cost the Kenyan economy over 12 billion US dollars. Consequently, the demand is ever-increasing for ex-ante drought early warning systems with the ability to offer drought forecasts with sufficient lead times The study uses 10 precipitation and vegetation condition indices that are lagged over 1, 2 and 3-month time-steps to predict future values of vege
APA, Harvard, Vancouver, ISO, and other styles
18

Salberg, Arnt-Børre, Tor Arne Øigård, Garry B. Stenson, Tore Haug, and Kjell T. Nilssen. "Estimation of seal pup production from aerial surveys using generalized additive models." Canadian Journal of Fisheries and Aquatic Sciences 66, no. 5 (2009): 847–58. http://dx.doi.org/10.1139/f09-040.

Full text
Abstract:
In this paper, we estimate the pup production of harp seals ( Pagophilus groenlandicus ) using generalized additive models (GAMs) based on thin-plate regression splines. The spatial distribution of seal pups in a patch is modelled using GAMs, and the pup production is estimated by numerically integrating the model over a fine grid area of the patch. Closed form expression for estimation of the the standard error of the pup production estimate is derived. The estimators are applied to simulated seal populations to investigate their properties. The results show that the proposed pup production e
APA, Harvard, Vancouver, ISO, and other styles
19

Mathison, C., A. J. Wiltshire, P. Falloon, and A. J. Challinor. "South Asia river flow projections and their implications for water resources." Hydrology and Earth System Sciences Discussions 12, no. 6 (2015): 5789–840. http://dx.doi.org/10.5194/hessd-12-5789-2015.

Full text
Abstract:
Abstract. South Asia is a region with a large and rising population and a high dependance on industries sensitive to water resource such as agriculture. The climate is hugely variable with the region relying on both the Asian Summer Monsoon (ASM) and glaciers for its supply of fresh water. In recent years, changes in the ASM, fears over the rapid retreat of glaciers and the increasing demand for water resources for domestic and industrial use, have caused concern over the reliability of water resources both in the present day and future for this region. The climate of South Asia means it is on
APA, Harvard, Vancouver, ISO, and other styles
20

Mennink, Bart, and Samuel Neves. "Optimal PRFs from Blockcipher Designs." IACR Transactions on Symmetric Cryptology, September 19, 2017, 228–52. http://dx.doi.org/10.46586/tosc.v2017.i3.228-252.

Full text
Abstract:
Cryptographic modes built on top of a blockcipher usually rely on the assumption that this primitive behaves like a pseudorandom permutation (PRP). For many of these modes, including counter mode and GCM, stronger security guarantees could be derived if they were based on a PRF design. We propose a heuristic method of transforming a dedicated blockcipher design into a dedicated PRF design. Intuitively, the method consists of evaluating the blockcipher once, with one or more intermediate state values fed-forward. It shows strong resemblance with the optimally secure EDMD construction by Mennink
APA, Harvard, Vancouver, ISO, and other styles
21

"A generalization of Freund's model for a repairable paired component based on a bivariate Geiger Muller (G.M.) counter." Microelectronics Reliability 26, no. 3 (1986): 577. http://dx.doi.org/10.1016/0026-2714(86)90534-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Qian, Xiaoyan, Hao Yin, and Xiaotong Li. "Marketing investment and pharmaceutical product diffusion." Marketing Intelligence & Planning ahead-of-print, ahead-of-print (2020). http://dx.doi.org/10.1108/mip-07-2020-0283.

Full text
Abstract:
PurposeThis paper aims to explore the influence of marketing investment on drug diffusion processes, to analyze the heterogeneity of the diffusion characteristics and to understand the drug diffusion patterns in the prescription and over-the-counter (OTC) markets.Design/methodology/approachThe study introduces marketing investment into the Bass model. The authors use the Generalized Bass Model (GBM) to examine the influence of marketing efforts on drug diffusion in Chinese prescription and OTC markets.FindingsThe results of this study suggest that the imitation effect in the prescription drug
APA, Harvard, Vancouver, ISO, and other styles
23

Gopakumar, Sricharan, Joy Gumin, Marc Daou, Daniel Ledbetter, Brittany Parker Kerrigan, and Frederick F. Lang. "Stem Cell Delivery of Oncolytic Adenovirus DNX-2401 Following Surgical Resection for the Treatment of Glioblastoma in a Murine Model." Neurosurgery 66, Supplement_1 (2019). http://dx.doi.org/10.1093/neuros/nyz310_312.

Full text
Abstract:
Abstract INTRODUCTION Current treatments for glioblastoma (GBM) are minimally effective and the prognosis for patients is uniformly poor despite multimodal therapy. While prior studies have examined intratumoral injection of oncolytic virus DNX-2401 into recurrent tumor, the potential of DNX-2401 delivered into the surgical resection cavity using tumor-tropic human mesenchymal stem cells (MSCs) has not been evaluated. We hypothesize that using a fibrin scaffold for transplanting MSCs loaded with DNX-2401 (MSCs-DNX-2401) into the resection cavity will improve MSC and viral delivery, kill residu
APA, Harvard, Vancouver, ISO, and other styles
24

Kondzior, Eliza, Rafał Kowalczyk, Małgorzata Tokarska, Tomasz Borowik, Andrzej Zalewski, and Marta Kołodziej-Sobocińska. "Multispecies reservoir of Spirometra erinaceieuropaei (Cestoda: Diphyllobothridae) in carnivore communities in north-eastern Poland." Parasites & Vectors 13, no. 1 (2020). http://dx.doi.org/10.1186/s13071-020-04431-5.

Full text
Abstract:
Abstract Background Spirometra erinaceieuropaei is a diphylobothriid tapeworm with a complex life-cycle including definitive, intermediate and paratenic (transport) hosts. Multiple routes of parasite transmission often make it impossible to determine what type of host a specific infected animal is considered to be. Spargana larvae cause sparganosis, a severe food- and water-borne disease mainly found in Asia. In Poland, Spirometra sp. was reported in large carnivores in Białowieża Primeval Forest for the first time in the 1940s and was recently confirmed as S. erinaceieuropaei in several mamma
APA, Harvard, Vancouver, ISO, and other styles
25

Burford, James. "“Dear Obese PhD Applicants”: Twitter, Tumblr and the Contested Affective Politics of Fat Doctoral Embodiment." M/C Journal 18, no. 3 (2015). http://dx.doi.org/10.5204/mcj.969.

Full text
Abstract:
It all started with a tweet. On the afternoon of 2 June 2013, Professor Geoffrey Miller, an evolutionary psychologist at the University of New Mexico (UNM) and visiting instructor at New York University (NYU), tweeted out a message that would go on to generate a significant social media controversy. Addressing aspiring doctoral program applicants, Miller wrote:Dear obese PhD applicants: if you didn’t have the willpower to stop eating carbs, you won't have the willpower to do a dissertation #truthThe response to Miller’s tweet was swift and fiery. Social media users began engaging with him on T
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!