搜索结果: 76-90 共查到“军事学 Authenticated Encryption”相关记录96条 . 查询时间(0.022 秒)
McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
secret-key cryptography authenticated encryption online encryption
2012/6/14
On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be run on-line and are provably ...
McOE:A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
secret-key cryptography / authenticated encryption online encryption provable security misuse resistant
2012/3/21
On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be run on-line and are provably ...
McOE:A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
secret-key cryptography / authenticated encryption online encryption provable security misuse resistant
2012/3/22
On-Line Authenticated Encryption (OAE) combines privacy with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be run on-line and are provably ...
Duplexing the sponge: single-pass authenticated encryption and other applications
foundations / sponge functions duplex construction authenticated encryption key wrapping, provable security pseudo-random bit sequence generator Keccak
2012/3/26
This paper proposes a novel construction, called duplex, closely related to the sponge construction, that accepts message blocks to be hashed and, at no extra cost, provides digests on the input block...
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
stream cipher with IV universal hash function authentication
2011/7/25
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption.
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird cipher constrained devices lightweight cryptography ISO 18000-6C
2012/3/29
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message processed. Like it's pre...
A Simple and Generic Construction of Authenticated Encryption With Associated Data
authenticated encryption with associated data collision resistant hash function generic construction
2009/6/12
We revisit the problem of constructing a protocol for performing authenticated encryption
with associated data (AEAD). A technique is described which combines a collision resistant hash function
wit...
Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm
Symmetric encryption message authentication authenticated encryption concrete security
2009/4/17
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to
provide both privacy and integrity. We consider two possible notions of authenticity for such
schemes, namely int...
Power of a Public Random Permutation and its Application to Authenticated-Encryption
authenticated-encryption DESX IAPM
2009/4/15
In this paper, we first show that many independent pseudorandom
permutations over {0, 1}n can be obtained from a single public random
permutation and secret n bits. We next prove that a slightly mod...
Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm
Authenticated Encryption Secure Shell SSH
2009/4/14
The Secure Shell (SSH) protocol is one of the most popular cryptographic protocols on the
Internet. Unfortunately, the current SSH authenticated encryption mechanism is insecure. In
this paper, we p...
Secure Channels based on Authenticated Encryption Schemes: A Simple Characterization
Secure channels authenticated encryption security notions
2009/4/14
We consider communication sessions in which a pair of parties begin by running an au-
thenticated key-exchange protocol to obtain a shared session key, and then secure successive
data transmissions ...
Cryptanalysis of publicly verifiable authenticated encryption
Cryptanalysis publicly verifiable authenticated encryption
2009/4/10
Ma and Chen proposed a new authenticated encryption scheme with public verifiability.
This scheme requires less computational costs and communication overheads than the
conventional signature-then-e...
CWC: A high-performance conventional authenticated encryption mode
Authenticated encryption modes of operation parallelism
2009/4/9
We introduce CWC, a new block cipher mode of operation for protecting both the privacy
and the authenticity of encapsulated data. CWC is currently the only such mode having all five
of the following...
We introduce a new cryptographic primitive we call concealment, which is related, but quite different
from the notion of commitment. A concealment is a publicly known randomized transformation, whic...
The Power of Verification Queries in Message Authentication and Authenticated Encryption
Message authentication PRFs Carter-Wegman
2009/4/1
This paper points out that, contrary to popular belief, allowing a message authentication
adversary multiple verification attempts towards forgery is not equivalent to allowing it a single one, so th...