搜索结果: 1-2 共查到“军队指挥学 indifferentiable security”相关记录2条 . 查询时间(0.082 秒)
Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the χ2 Method
random permutation indifferentiable security χ2 method
2018/3/6
The construction XORPXORP (bitwise-xor of outputs of two independent nn-bit random permutations) has gained broad attention over the last two decades due to its high security.
Indifferentiable Security Analysis of choppfMD,chopMD, a chopMDP, chopWPH, chopNI,chopEMD, chopCS, and chopESh Hash Domain Extensions
choppfMD chopMD chopWPH chopNI chopEMD chopCS chopESh Hash Domain Extensions
2009/6/9
We provide simple and unified indifferentiable security analyses
of choppfMD, chopMD, a chopMDP (where the permutation P is to
be xored with any non-zero constant.), chopWPH (the chopped version of
...