军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 blockcipher based相关记录16条 . 查询时间(0.109 秒)
Lightweight cryptography in computationally constrained devices is actively studied. In contrast to advances of lightweight blockcipher in the last decade, lightweight mode of operation is seemingly n...
Blockcipher-based MACs: Beyond the Birthday Bound without Message Length     MAC, blockcipher, PRF       font style='font-size:12px;'> 2017/9/13
We present blockcipher-based MACs (Message Authentication Codes) that have beyond the birthday bound security without message length in the sense of PRF (Pseudo-Random Function) security. Achieving su...
Blockcipher-based Authenticated Encryption: How Small Can We Go?     COFB  AES  authenticated encryption       font style='font-size:12px;'> 2017/7/6
This paper presents a design of authenticated encryption (AE) focusing on minimizing the implementation size, i.e., hardware gates or working memory on software. The scheme is called COFB, for COmbine...
We also propose another some generic universal forgery attacks using collision finding with structural input messages, by birthday paradox in the classic setting. Since our attacks are based on the co...
The concrete security bounds for some blockcipher-based constructions sometimes become worrisome or even vacuous; for example, when a light-weight blockcipher is used, when large amounts of data are p...
In FSE 2010, Nandi proved a sufficient condition of pseudo random function (PRF) for affine domain extensions (ADE), wide class of block cipher based domain extensions. This sufficient condition is sa...
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions     Hash function  Blockcipher       font style='font-size:12px;'> 2014/3/12
Preneel et al.~(Crypto 1993) assessed 64 possible ways to construct a compression function out of a blockcipher. They conjectured that 12 out of these 64 so-called PGV constructions achieve optimal se...
In this paper we attack a $2n$-bit double length hash function proposed by Lee et al. This proposal is a blockcipher-based hash function with hash rate $2/3$. The designers claimed that it could achie...
In this paper we attack a $2n$-bit double length hash function proposed by Lee et al. This proposal is a blockcipher-based hash function with hash rate $2/3$. The designers claimed that it could achie...
More Insights on Blockcipher-Based Hash Functions     Blockcipher-Based Hash Functions  SBL  DBL       font style='font-size:12px;'> 2010/12/22
In this paper we give more insights on the security of blockcipher-based hash functions. We give a very simple criterion to build a secure large class of Single-Block-Length (SBL) or double call Doubl...
The notion of PRO (pseudorandom oracle) is an important security notion of hash functions because a PRO hash function inherits all properties of a random oracle up to the PRO bound (e.g., security aga...
We provide the first preimage resistance bounds for block cipher based double length, double call hash functions that go \emph{beyond} the birthday bound. More precisely, we consider hash functions us...
This paper provides a unified framework for improving PRF (pseudorandom function) advantages of several popular MACs (mes- sage authentication codes) based on a blockcipher modeled as RP (ran- dom ...
Blockcipher Based Hashing Revisited     Blockcipher  Hashing Revisited  hash functions       font style='font-size:12px;'> 2009/6/3
We revisit the rate-1 blockcipher based hash functions as first studied by Preneel, Govaerts and Vandewalle (Crypto’93) and later extensively analysed by Black, Rogaway and Shrimpton (Crypto’02). We ...
The Ideal-Cipher Model of a blockcipher is a well-known and widely-used model dating back to Shannon [24] and has seen frequent use in proving the security of various cryptographic objects and proto...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...