军事学 >>> 军事学
搜索结果: 1-9 共查到军事学 modes of operation相关记录9条 . 查询时间(0.079 秒)
Block cipher modes of operation provide a way to securely encrypt using a block cipher. The main factors in analyzing modes of operation are the level of security achieved (chosen-plaintext security, ...
Modes of Operation Suitable for Computing on Encrypted Data     secret-key cryptography  OTR mode       font style='font-size:12px;'> 2017/6/2
We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multi-party computation engine. These two modes are selected because...
Security Analysis of BLAKE2's Modes of Operation     BLAKE  BLAKE2  hash function       font style='font-size:12px;'> 2016/12/10
BLAKE2 is a hash function introduced at ACNS 2013, which has been adopted in many constructions and applications. It is a successor to the SHA-3 finalist BLAKE, which received a significant amount of ...
We examine the IND-qCPA security of the wide-spread block cipher modes of operation CBC, CFB, OFB, CTR, and XTS (i.e., security against quantum adversaries doing queries in superposition). We show t...
Automated Analysis and Synthesis of Block-Cipher Modes of Operation     modes of operation  synthesis       font style='font-size:12px;'> 2016/1/7
Block ciphers such as AES are deterministic, keyed functions that operate on small, fixed-size blocks. Block-cipher modes of operation define a mechanism for probabilistic encryption of arbitrary len...
In this paper, we propose a new double-piped mode of operation for multi- property-preserving domain extension of MACs (message authentication codes), PRFs (pseu- dorandom functions) and PROs (pseud...
An observation regarding Jutla's modes of operation     Jutla's modes  operation       font style='font-size:12px;'> 2009/4/16
Recently, Jutla suggested two new modes of operation for block ciphers. These modes build on traditional CBC and ECB modes, respectively, but add to them masking of the outputs and inputs. Jutla pro...
In this paper, we define and analyze a new blockcipher mode of operation for encryption, CENC, which stands for Cipher-based ENCryption. CENC has the following advantages: (1) beyond the birthday bo...
The security of interchanged use of modes of operation of block ciphers have not been discussed in the public literature. So far, the modes of operation of block ciphers have been treated as completel...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...