搜索结果: 61-75 共查到“军事学 Authenticated Encryption”相关记录96条 . 查询时间(0.059 秒)
Automated Analysis and Synthesis of Authenticated Encryption Schemes
secret-key cryptography authenticated encryption synthesis
2015/12/29
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong notions
of confidentiality and integrity. Although various AE schemes are known, there remains significant
...
Authenticated Encryption without Tag Expansion (or, How to Accelerate AERO)
Authenticated Encryption Stateful Decryption Provable Security
2015/12/24
Standard form of authenticated encryption (AE) requires the ciphertext to be expanded
by the nonce and the authentication tag. These expansions can be problematic when messages are
relatively short ...
Cryptanalysis of the Authenticated Encryption Algorithm COFFE
COFFE Authenticated cipher Forgery Attack
2015/12/24
COFFE is a hash-based authenticated encryption scheme. In the original paper,
it was claimed to have IND-CPA security and also ciphertext integrity even in nonce-misuse
scenario. In this paper, we a...
Robust Authenticated Encryption and the Limits of Symmetric Cryptography
Authenticated Encryption Composability Constructive Cryptography
2015/12/23
. Robust authenticated encryption (RAE) is a primitive for
symmetric encryption that allows to flexibly specify the ciphertext expansion,
i.e., how much longer the ciphertext is compared to the plai...
Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN
CAESAR Authenticated encryption AEAD
2015/12/23
This paper analyzes the authenticated encryption algorithm
ACORN, a candidate in the CAESAR cryptographic competition. We
identify weaknesses in the state update function of ACORN which result
in c...
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
Tweakable Even-Mansour masking optimization
2015/12/22
A popular approach to tweakable blockcipher design is via
masking, where a certain primitive (a blockcipher or a permutation) is
preceded and followed by an easy-to-compute tweak-dependent mask.
In...
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
authenticated encryption tweakable block cipher nonce-misuse resistance
2015/12/21
We propose the Synthetic Counter-in-Tweak (SCT) mode,
which turns a tweakable block cipher into a nonce-based authenticated
encryption scheme (with associated data). The SCT mode combines in
a SIV-...
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
authentication authenticated encryption with associated data (AEAD) Transport Layer Security (TLS) protocol
2015/12/21
Authentication and authenticated encryption with associated data (AEAD) are applied
in cryptographic protocols to provide message integrity. The definitions in the literature
and the constructions u...
NORX8 and NORX16: Authenticated Encryption for Low-End Systems
authenticated encryption lightweight CAESAR
2015/12/21
This paper presents NORX8 and NORX16,
the 8-bit and 16-bit versions of the authenticated cipher
NORX, one of the CAESAR candidates. These new
versions are better suited for low-end systems—such as
...
Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack
homomorphic MAC homomorphic encryption
2014/3/6
We study homomorphic authenticated encryption, where privacy and authenticity of data are protected simultaneously. We define homomorphic versions of various security notions for privacy and authentic...
CBEAM: Efficient Authenticated Encryption from Feebly One-Way $\phi$ Functions
Authenticated Encryption Cryptographic Sponge Functions
2014/3/5
We show how efficient and secure cryptographic mixing functions can be constructed from low-degree rotation-invariant $\phi$ functions rather than conventional S-Boxes. These novel functions have surp...
This paper introduces a dedicated authenticated encryption algorithm AEGIS; AEGIS allows for the protection of associated data which makes it very suitable for protecting network packets. AEGIS-128L u...
Parallel authenticated encryption with the duplex construction
duplex construction authenticated encryption
2014/3/7
The authentication encryption (AE) scheme based on the duplex construction can no be paralellized at the algorithmic level. To be competitive with some block cipher based modes like OCB (Offset CodeBo...
Parallelizable Authenticated Encryption from Functions
authenticated encryption blockcipher
2014/3/7
A new authenticated encryption (AE) mode for blockcipher is presented. The proposed scheme has attractive features for fast and compact operation. It requires rate-1 blockcipher call, and uses the enc...
The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE
secret-key cryptography
2014/3/12
We show how to produce a forged (ciphertext,tag) pair for the scheme ALE with data and time complexity of 2^102 ALE encryptions of short messages and the same number of authentication attempts. We use...