搜索结果: 1-7 共查到“军事学 symmetric cryptography”相关记录7条 . 查询时间(0.111 秒)
Towards post-quantum symmetric cryptography
Symmetric cryptography quantum AES
font style='font-size:12px;'>
2019/5/24
With this work, we intend on demonstrating the need for improvements to the currently standardized AES family of cryptosystems, and provide a solution that meets the requirements of long-term security...
Exploiting Ineffective Fault Inductions on Symmetric Cryptography
fault attack infective countermeasure fault detection
font style='font-size:12px;'>
2018/1/19
Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and new techniques for fault attacks and countermeasures have been studied extensively. The vast majority of t...
An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography
post-quantum cryptography symmetric cryptography collision search
font style='font-size:12px;'>
2017/9/7
The cryptographic community has widely acknowledged that the emergence of large quantum computers will pose a threat to most current public-key cryptography. Primitives that rely on order-finding prob...
State of the Art in Lightweight Symmetric Cryptography
Lightweight cryptography Ultra-Lightweight IoT
font style='font-size:12px;'>
2017/6/5
Lightweight cryptography has been one of the ``hot topics'' in symmetric cryptography in the recent years. A huge number of lightweight algorithms have been published, standardized and/or used in comm...
Robust Authenticated Encryption and the Limits of Symmetric Cryptography
Authenticated Encryption Composability Constructive Cryptography
font style='font-size:12px;'>
2015/12/23
. Robust authenticated encryption (RAE) is a primitive for
symmetric encryption that allows to flexibly specify the ciphertext expansion,
i.e., how much longer the ciphertext is compared to the plai...
Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions
implementation leakage-resilient cryptography
font style='font-size:12px;'>
2014/3/12
Leakage-resilient cryptography aims at formally proving the security of cryptographic implementations against large classes of side-channel adversaries. One important challenge for such an approach to...
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography
Block ciphers Convolutional codes Parallel algorithms Symmetric encryption
font style='font-size:12px;'>
2008/10/17
Worldwide symmetric encryption standards such as DES (Data Encryption Standard),
AES (Advanced Encryption Standard), and EES (Escrowed Encryption Standard), have been
– and some of them still are – ...