搜索结果: 91-96 共查到“军事学 Authenticated Encryption”相关记录96条 . 查询时间(0.311 秒)
VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme
Authenticated Encryption MAC Stream Cipher
2009/4/1
A stream cipher based algorithm for computing Message Au-
thentication Codes is described. The algorithm employs the internal
state of the underlying cipher to minimize the required additional-to-
...
A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security
Authenticated-Encryption Chosen-Ciphertext Security
2009/3/31
In this note we introduce a variation of the standard definition of chosen-ciphertext security,
which we call IND-CCA3, and prove that IND-CCA3 is equivalent to authenticated-encryption.
A Secure Scheme for Authenticated Encryption
Authenticated encryption digital signature encryption
2009/3/19
The paper proposes a new scheme of authenticated encryption that is either publicly
verifiable or not publicly verifiable depending on the quantity of information the recipient
released. This proper...
Deterministic Authenticated-Encryption A Provable-Security Treatment of the Key-Wrap Problem
Authenticated encryption cryptographic definitions cryptographic standards
2008/12/2
Standards bodies have been addressing the key-wrap problem, a cryptographic goal that has never received a provable-security treatment. In response, we provide one, giving definitions, constructions, ...
Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption
Authenticated encryption Sensor network security Dragon stream cipher
2008/8/26
Sensor networks offer economically viable monitoring solutions for a
wide variety of applications. In order to combat the security threats that sensor
networks are exposed to, a cryptography protoco...
Provable-Security Analysis of Authenticated Encryption in Kerberos
Provable-Security Authenticated Encryption Kerberos
2008/8/21
Kerberos is a widely-deployed network authentication protocol that is being considered for
standardization. Many works have analyzed its security, identifying flaws and often suggesting
fixes, thus ...