搜索结果: 1-3 共查到“军队指挥学 cascade encryption”相关记录3条 . 查询时间(0.064 秒)
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption
Block ciphers Pseudorandomness
2016/1/3
This paper discusses provable security of two types of cascade encryptions. The first construction \CEl, called l-cascade encryption, is obtained by sequentially composing l blockcipher calls with ind...
The Iterated Random Permutation Problem with Applications to Cascade Encryption
iterated random permutation problem block cipherlpseudorandom permutation
2015/12/30
We introduce and study the iterated random permutation
problem, which asks how hard it is to distinguish, in a black-box way, the rth
power of a random permutation from a uniformly random permutatio...
The security of cascade blockcipher encryption is an important
and well-studied problem in theoretical cryptography with practical
implications. It is well-known that double encryption improves the ...