军事学 >>> 军事学
搜索结果: 1-8 共查到军事学 Universal forgery相关记录8条 . 查询时间(0.067 秒)
This article presents universal forgery and multiple forgeries against MergeMAC that has been recently proposed to fit scenarios where bandwidth is limited and where strict time constraints apply. Mer...
Universal Forgery and Key Recovery Attacks: Application to FKS, FKD and Keyak     FKS  FKD       font style='font-size:12px;'> 2017/7/24
In the quantum model, by utilizing the Simon's algorithm, we propose an efficient universal forgery attack to FKS, FKD and Keyak with complexity of O(c)O(c). Moreover, we also propose an efficient key...
We also propose another some generic universal forgery attacks using collision finding with structural input messages, by birthday paradox in the classic setting. Since our attacks are based on the co...
In this paper, we provide a security analysis of ELmD: a block cipher based Encrypt-Linear-mix-Decrypt authentication mode. As being one of the second-round CAESAR candidate, it is claimed to provide ...
A Practical Universal Forgery Attack against PAES-8     PAES-8  Universal Forgery Attack  Nonce Misuse       font style='font-size:12px;'> 2016/1/25
PAES is an authenticated encryption scheme designed by Ye et al., and submitted to the CAESAR competition. The designers claim that PAES-8, which is one of the designs of the PAES-family, provides ...
Generic Universal Forgery Attack on Iterative Hash-based MACs     HMAC  NMAC  hash function  universal forgery       font style='font-size:12px;'> 2016/1/9
In this article, we study the security of iterative hash-based MACs, such as HMAC or NMAC, with regards to universal forgery attacks. Leveraging recent advances in the analysis of functional graphs ...
COPA is a block-cipher-based authenticated encryption mode with a provable birthday-bound security under the assumption that the underlying block cipher is a strong pseudorandom permutation, and its...
In this paper we propose a universal forgery attack of Hesss second ID- based signature scheme against the known-message attack. Recently, several ID-based signature schemes based on binary maps on...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...