搜索结果: 1-5 共查到“军事学 GCM-SIV”相关记录5条 . 查询时间(0.593 秒)
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds
Multi-user security AES-GCM-SIV authenticated encryption
2018/2/8
This paper revisits the multi-user (mu) security of symmetric encryption, from the perspective of delivering an analysis of the AES-GCM-SIV AEAD scheme. Our end result shows that its mu security is co...
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption scheme currently considered for standardization by the Crypto Forum Research Group (CFRG). First, we p...
AES-GCM-SIV: Specification and Analysis
modes of operation nonce-misuse resistance security bounds
2017/2/24
In this paper, we describe and analyze the security of the AES-GCM-SIV mode of operation, as defined in the CFRG specification \cite{CFRG}. This mode differs from the original GCM-SIV mode that was de...
Stronger Security Variants of GCM-SIV
GCM-SIV nonce-reuse misuse-resistance authenticated encryption provable security
2016/12/10
At CCS 2015, Gueron and Lindell proposed GCM-SIV, a provably secure authenticated encryption scheme that remains secure even if the nonce is repeated. While this is an advantage over the original GCM,...
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
modes of operation authenticated encryption nonce misuse resistance
2016/1/4
Authenticated encryption schemes guarantee both privacy
and integrity, and have become the default level of encryption in modern
protocols. One of the most popular authenticated encryption schemes
...