搜索结果: 31-45 共查到“军事学 Authenticated Encryption”相关记录96条 . 查询时间(0.178 秒)
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption
message authentication codes authenticated encryption provable security
2016/12/29
This paper proposes an authenticated encryption scheme, called SIVx, that preserves BBB security also in the case of unlimited nonce reuses. For this purpose, we propose a single-key BBB-secure messag...
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
CAESAR Authenticated Encryption Cube Attack
2016/12/12
The cube attack is an algebraic attack that allows an adversary to extract low degree polynomial equations from the targeted cryptographic primitive. This work applies the cube attack to a reduced rou...
ISAP -- Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks
authenticated encryption fresh re-keying passive side-channel attacks
2016/12/8
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to counteract such attacks are cryptographic schem...
Leakage-Resilient and Misuse-Resistant Authenticated Encryption
secret-key cryptography leakage-resilience
2016/12/8
Leakage-resilience and misuse-resistance are two important properties for the deployment
of authenticated encryption schemes. They aim at mitigating the impact of implementation flaws due
to side-ch...
Insecurity of RCB: Leakage-Resilient Authenticated Encryption
authenticated encryption leakage-resilience block cipher
2016/12/7
One of the main issues of modern cryptography is the vulnerability of cryptosystem
implementations against side-channel attacks. To thwart this kind of attack,
countermeasures such as masking [14], ...
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm
Authenticated encryption CAESAR ELmD
2016/6/22
In this paper, we provide a security analysis of ELmD: a block cipher based Encrypt-Linear-mix-Decrypt authentication mode. As being one of the second-round CAESAR candidate, it is claimed to provide ...
Practical Fault Attacks on Authenticated Encryption Modes for AES
fault attacks authenticated encryption CAESAR
2016/6/17
Since the first demonstration of fault attacks by Boneh et
al. on RSA, a multitude of fault attack techniques on various cryptosystems
have been proposed. Most of these techniques, like Differential...
The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
authenticated encryption TLS 1.3 multi-user security
2016/6/6
We initiate the study of multi-user (mu) security of authenticated encryption (AE) schemes as
a way to rigorously formulate, and answer, questions about the “randomized nonce” mechanism
proposed for...
Authenticated Encryption with Variable Stretch
authenticated encryption variable-length tags robustness
2016/5/17
In conventional authenticated-encryption (AE) schemes, the ciphertext expansion, a.k.a. stretch or tag length, is a constant or a parameter of the scheme that must be fixed per key. However, using var...
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch
deterministic authenticated encryption symmetric cryptography cryptographic schemes
2016/4/22
Block-cipher-based authenticated encryption has obtained considerable attention from the ongoing CAESAR competition. While the focus of CAESAR resides primarily on nonce-based authenticated encryption...
Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach
Lattice-based cryptography post-quantum cryptography authenticated encryption
2016/3/11
Lattice-based cryptography has been received significant attention in the past decade. It has attractive properties such as
being a major post-quantum cryptography candidate, enjoying worst-case to a...
In this paper, we provide performance measures for software implementations
of the NSA-designed S敲歉嵌蔷128 block cipher together with various existing authenticated
encryption modes. We investigated S...
How to Securely Release Unverified Plaintext in Authenticated Encryption
Plaintext Awareness Plaintext Extractor CAESAR Competition
2016/1/25
Scenarios in which authenticated encryption schemes output decrypted plaintext before
successful verification raise many security issues. These situations are sometimes unavoidable in
practice, such...
CLOC: Authenticated Encryption for Short Input
CLOC blockcipher authenticated encryption with associated data
2016/1/25
We define and analyze the security of a blockcipher mode of operation, CLOC, for provably
secure authenticated encryption with associated data. The design of CLOC aims at optimizing
previous schemes...
AES-Based Authenticated Encryption Modes in Parallel High-Performance Software
Authenticated encryption AES-NI pclmulqdq
2016/1/25
Authenticated encryption (AE) has recently gained renewed interest due to the
ongoing CAESAR competition. This paper deals with the performance of block cipher modes
of operation for AE in parallel ...