搜索结果: 46-60 共查到“军事学 Authenticated Encryption”相关记录96条 . 查询时间(0.03 秒)
JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
Authenticated Encryption Provable Security Privacy
2016/1/25
In this paper JHAE, an authenticated encryption (AE) mode, was presented based
on the JH hash mode. JHAE is an on-line and single-pass dedicated AE mode based on permutation
that supports optional a...
ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption
authenticated encryption scheme authenticated cipher ICEPOLE
2016/1/23
This paper introduces our dedicated authenticated encryption scheme ICEPOLE. ICEPOLE is a high-speed hardware-oriented scheme, suitable for high-throughput network nodes or generally any environment...
STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation
StriBob Authenticated Encryption GOST R 34.11-2012
2016/1/23
Authenticated encryption algorithms protect both the confidentiality and integrity of messages in a single processing pass. In this note we show how to utilize the L◦P ◦S transform of th...
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
Authenticated encryption CAESAR Ascon
2016/1/9
The Sponge function is known to achieve 2^{c/2} security, where c is its capacity. This bound was carried over to keyed variants of the function, such as SpongeWrap, to achieve a min{2^{c/2},2^kappa} ...
On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption
authentication authenticated encryption authenticated encryption with associated data
2016/1/8
This work deals with the various requirements of encryption and authentication in cryptographic
applications. The approach is to construct suitable modes of operations of a block cipher to achieve th...
Robust Authenticated-Encryption: AEZ and the Problem that it Solves
AEZ authenticated encryption CAESAR competition
2016/1/6
With a scheme for robust authenticated-encryption a user can select an arbitrary value λ≥ 0
and then encrypt a plaintext of any length into a ciphertext that’s λ characters longer. The scheme
must p...
The BRUTUS automatic cryptanalytic framework: Testing CAESAR authenticated encryption candidates for weaknesses
Authenticated Encryption CAESAR BRUTUS
2016/1/6
This report summarizes our results from security analysis covering all 57 competitions for authenticated encryption: security, applicability, and robustness (CAESAR) first-round candidates and over 21...
Authenticated Encryption: How Reordering can Impact Performance
secret-key cryptography key recovery attacks
2016/1/5
In this work, we look at authenticated encryption schemes from a new perspective. As opposed to focusing
solely on the “security” implications of the different methods for constructing authenticated ...
On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack
Authenticated encryption algorithm COPA Marble
2016/1/4
COPA is a block-cipher-based authenticated encryption mode
with a provable birthday-bound security under the assumption that the
underlying block cipher is a strong pseudorandom permutation, and its...
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
modes of operation authenticated encryption nonce misuse resistance
2016/1/4
Authenticated encryption schemes guarantee both privacy
and integrity, and have become the default level of encryption in modern
protocols. One of the most popular authenticated encryption schemes
...
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE
authenticated encryption forgery attack ALE
2016/1/4
ALE is a new authenticated encryption algorithm published at FSE 2013. The
authentication component of ALE is based on the strong Pelican MAC, and the authentication
security of ALE is claimed to be...
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE
authenticated encryption forgery attack ALE
2016/1/4
ALE is a new authenticated encryption algorithm published at FSE 2013. The
authentication component of ALE is based on the strong Pelican MAC, and the authentication
security of ALE is claimed to be...
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
Authenticated encryption CAESAR competition misuse resistance
2016/1/3
A definition of online authenticated-encryption (OAE), call it OAE1, was given by Fleischmann,
Forler, and Lucks (2012). It has become a popular definitional target because, despite allowing encrypti...
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices
Authenticated encryption CAESAR Cryptographic module
2015/12/31
In authenticated encryption schemes, there are two techniques for handling long ciphertexts while working
within the constraints of a low buffer size: Releasing unverified plaintext (RUP) or Producin...
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
Sponge construction Duplex construction full-state absorption
2015/12/30
We provide a security analysis for full-state keyed Sponge and full-state Duplex
constructions. Our results can be used for making a large class of Sponge-based authenticated
encryption schemes more...