搜索结果: 16-30 共查到“军事学 provable security”相关记录32条 . 查询时间(0.426 秒)
Provable Security of BLAKE with Non-Ideal Compression Function
secret-key cryptography / SHA-3 BLAKE collision resistance
2012/6/14
We analyze the security of the SHA-3 finalist BLAKE. The BLAKE hash function follows the HAIFA design methodology, and as such it achieves optimal preimage, second preimage and collision resistance, a...
Provable Security of BLAKE with Non-Ideal Compression Function
secret-key cryptography / SHA-3 BLAKE collision resistance (second) preimage resistance indifferentiability
2012/3/22
We analyze the security of the SHA-3 finalist BLAKE. The BLAKE hash function follows the HAIFA design methodology, and as such it achieves optimal preimage, second preimage and collision resistance, a...
Provable Security of BLAKE with Non-Ideal Compression Function
secret-key cryptography / SHA-3, BLAKE collision resistance (second) preimage resistance indifferentiability
2012/3/21
We analyze the security of the SHA-3 finalist BLAKE. The BLAKE hash function follows the HAIFA design methodology, and as such it achieves optimal preimage, second preimage and collision resistance, a...
Automatic Approach of Provable Security and its Application for OAEP+
cryptographic protocols probable security automatic security proof
2009/6/11
Probable security is an important criteria for analyzing the security of cryptographic protocols. However, writing and verifying proofs by hand are prone to errors. This paper introduces the game-base...
Provable Security of Digital Signatures in the Tamper-Proof Device Model
Provable Security Digital Signatures Tamper-Proof Device Model
2009/6/5
Provable Security of Digital Signatures in the Tamper-Proof Device Model.
On the Provable Security of Multi-Receiver Signcryption Schemes
Signcryption Cryptanalysis Identity Based Cryptography
2009/6/5
In ATC 2007, an identity based signcryption scheme for multiple receivers was proposed by
Yu et al. In this paper, we first show that Yu et al.’s signcryption scheme is insecure by demonstrating
an ...
We consider the impact of the possibility of decryption failures in proofs of security for
padding schemes, where these failures are both message and key dependent. We explain that
an average case f...
Efficient and Optimistic Fair Exchanges Based on Standard RSA with Provable Security
Efficient and Optimistic Fair Exchanges Standard RSA Provable Security
2009/4/3
Efficient and Optimistic Fair Exchanges Based on Standard RSA with Provable Security.
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
Access Control Scheme Partially Ordered Set Hierarchy Provable Security
2009/4/1
In a hierarchical structure, an entity has access to another
if and only if the former is a superior of the later. The access control
scheme for a hierarchy represented by a partially ordered set (p...
Another Look at“Provable Security”
Cryptography Public Key Provable Security AMS subject classifications
2009/3/27
We give an informal analysis and critique of several typical "provable
security" results. In some cases there are intuitive but convincing argu-
ments for rejecting the conclusions suggested by the ...
Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash
Generic signature schemes short signatures provable security
2009/3/27
The object of this paper is the concrete security of recent
multivariate signature schemes. A major challenge is to reconcile some
”tricky” ad-hoc constructions that allow to make short signatures, ...
Fundamental problems in provable security and cryptography
cryptography provable security
2008/12/12
This paper examines methods for formally proving the security of cryptographic
schemes.We show that, despite many years of active research, there are fundamental
problems which have yet to be solved...
Fundamental problems in provable security and cryptography
cryptography provable security
2008/12/11
This paper examines methods for formally proving the security of cryptographic
schemes.We show that, despite many years of active research, there are fundamental
problems which have yet to be solved...
Deterministic Authenticated-Encryption A Provable-Security Treatment of the Key-Wrap Problem
Authenticated encryption cryptographic definitions cryptographic standards
2008/12/2
Standards bodies have been addressing the key-wrap problem, a cryptographic goal that has never received a provable-security treatment. In response, we provide one, giving definitions, constructions, ...
On the Provable Security of an E±cient RSA-Based Pseudorandom Generator
Pseudorandom generator RSA provable security lattice attack
2008/11/28
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have
been extensively studied in the literature over the last 25 years. These generators have the attrac-tive feature o...