搜索结果: 1-9 共查到“军事学 Encryption Mode”相关记录9条 . 查询时间(0.078 秒)
SimpleENC and SimpleENCsmall -- an Authenticated Encryption Mode for the Lightweight Setting
modes of operation lightweight cryptography authenticated encryption
2019/6/19
Block cipher modes of operation provide a way to securely encrypt using a block cipher, and different modes of operation achieve different tradeoffs of security, performance and simplicity. In this pa...
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
Authenticated encryption beyond-birthday-bound security tweakable block- cipher
2019/4/3
Using a small block length is a common strategy in designing lightweight block cipher. So far, many 64-bit primitives have been proposed. However, if we use such a 64-bit primitive for an authenticate...
Security bound for CTR-ACPKM internally re-keyed encryption mode
re-keying block cipher mode of operation CTR
2018/11/6
In 2018 the CTR-ACPKM internally re-keyed block cipher mode was adopted in Russian Standardization System and must pass through the last formal standardization stages in IETF. The main distinctive fea...
We study instantiating the random permutation of the block-cipher mode of operation IAPM (Integrity-Aware Parallelizable Mode) with the public random permutation of Keccak, on which the draft standard...
On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing
key management block ciphers counter mode
2016/6/20
This paper presents a security bound in the standard security model for the Magma cipher CTR encryption mode and the 獵ryptoPro Key Meshing?(CPKM) re-keying method that was previously used with the GOS...
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
Authenticated Encryption Provable Security Privacy
2016/1/25
In this paper JHAE, an authenticated encryption (AE) mode, was presented based
on the JH hash mode. JHAE is an on-line and single-pass dedicated AE mode based on permutation
that supports optional a...
Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode
differential cryptanalysis related-key rectangle attack HAS-160
2009/7/14
In this paper we investigate the security of the encryption mode of the HAS-160 hash
function. HAS-160 is a Korean hash standard which is widely used in Korea’s industry. The structure
of HAS-160 is...
CWC: A high-performance conventional authenticated encryption mode
Authenticated encryption modes of operation parallelism
2009/4/9
We introduce CWC, a new block cipher mode of operation for protecting both the privacy
and the authenticity of encapsulated data. CWC is currently the only such mode having all five
of the following...
Invertible Universal Hashing and the TET Encryption Mode
Invertible Universal Hashing TET Encryption Mode
2008/9/19
This work describes a mode of operation, TET, that turns a regular block cipher into a
length-preserving enciphering scheme for messages of (almost) arbitrary length. When using an
n-bit block cip...