搜索结果: 1-13 共查到“军事学 Mode of operation”相关记录13条 . 查询时间(0.187 秒)
SPAE a mode of operation for AES on low-cost hardware
secret-key cryptography AES block ciphers
2019/9/16
We propose SPAE, a single pass, patent free, authenticated encryption with associated data (AEAD) for AES. The algorithm has been developped to address the needs of a growing trend in IoT systems: sto...
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation
Lightweight cryptography authenticated encryption with associated data blockciphe
2019/6/14
Lightweight cryptography in computationally constrained devices is actively studied. In contrast to advances of lightweight blockcipher in the last decade, lightweight mode of operation is seemingly n...
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
Authenticated encryption beyond-birthday-bound security tweakable block- cipher
2019/4/3
Using a small block length is a common strategy in designing lightweight block cipher. So far, many 64-bit primitives have been proposed. However, if we use such a 64-bit primitive for an authenticate...
A Block-Cipher Mode of Operation for Parallelizable Message Authentication
block-cipher modes message authentication codes modes of operation
2009/4/16
We define and analyze a simple and fully parallelizable block-cipher mode of operation for
message authentication. Parallelizability does not come at the expense of serial efficiency: in a
conventio...
We describe a block-cipher mode of operation, EMD, that builds a strong pseudorandom permutation
(PRP) on nm bits (m ≥ 2) out of a strong PRP on n bits (i.e., a block cipher). The
constructed PRP is...
A Mode of Operation with Partial Encryption and Message Integrity(PEMI)
Mode of Operation Partial Encryption Message Integrity PEMI
2009/4/7
At the recent AES Modes of Operation Conference, several
modes of operation were proposed for using a block cipher to provide
both confidentiality and authentication. These modes require only a litt...
We describe a block cipher mode of operation that implements a ‘tweakable’ (super) pseudorandom
permutation with an arbitrary block length. This mode can be used to provide the
best possible securit...
In this paper I propose a tweakable block cipher construction with a mode
of operation that combines counter and chaining methods. Using a single key, the
direct application of this mode produces un...
3C-A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function
3C-A Provably Secure Pseudorandom Function Message Authentication Code Cryptographic Hash Function
2009/3/13
We propose a new cryptographic construction called 3C, which works as a pseudoran-
dom function (PRF), message authentication code (MAC) and cryptographic hash function. The 3C-
construction is obta...
High Speed Architecture for Galois/Counter Mode of Operation(GCM)
High Speed Architecture Galois/Counter Mode GCM
2009/2/7
In this paper we present a fully pipelined high speed hardware architecture
for Galois/Counter Mode of Operation (GCM) by analyzing the data
dependencies in the GCM algorithm at the architecture lev...
Cryptanalysis of the MEM Mode of Operation
Blockcipher tweakable blockcipher modes of operation nonce-based encryption
2008/11/5
The MEM mode is a nonce-based enciphering mode of op-
eration proposed by Chakraborty and Sarkar, which was claimed to be
secure against symmetric nonce respecting adversaries. We show that
this is...
The Security of the Extended Codebook (XCB) Mode of Operation
Security the Extended Codebook (XCB) Mode of Operation
2008/6/2
The XCB mode of operation was outlined in 2004 as a contribution
to the IEEE Security in Storage effort, but no security analysis
was provided.
Improving Upon the TET Mode of Operation
modes of operations tweakable encryption strong pseudo-random permutation
2008/5/30
Naor and Reingold had proposed the construction of a strong pseudo-random permutation
(SPRP) by using a layer of ECB encryption between two layers of invertible block-wise universal hash functions.