搜索结果: 1-7 共查到“军队指挥学 Encryption Modes”相关记录7条 . 查询时间(0.093 秒)
Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes
side channel analysis fault attack authenticated encryption
font style='font-size:12px;'>
2017/7/28
The XOR-Encrypt-XOR (XEX) block cipher mode was introduced by Rogaway in 2004. XEX mode uses nonce-based secret masks (L)(L) that are distinct for each message. The existence of secret masks in XEX mo...
Practical Fault Attacks on Authenticated Encryption Modes for AES
fault attacks authenticated encryption CAESAR
font style='font-size:12px;'>
2016/6/17
Since the first demonstration of fault attacks by Boneh et
al. on RSA, a multitude of fault attack techniques on various cryptosystems
have been proposed. Most of these techniques, like Differential...
AES-Based Authenticated Encryption Modes in Parallel High-Performance Software
Authenticated encryption AES-NI pclmulqdq
font style='font-size:12px;'>
2016/1/25
Authenticated encryption (AE) has recently gained renewed interest due to the
ongoing CAESAR competition. This paper deals with the performance of block cipher modes
of operation for AE in parallel ...
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
Authenticated encryption CAESAR Ascon
font style='font-size:12px;'>
2016/1/9
The Sponge function is known to achieve 2^{c/2} security, where c is its capacity. This bound was carried over to keyed variants of the function, such as SpongeWrap, to achieve a min{2^{c/2},2^kappa} ...
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
authenticated encryption tweakable block cipher nonce-misuse resistance
font style='font-size:12px;'>
2015/12/21
We propose the Synthetic Counter-in-Tweak (SCT) mode,
which turns a tweakable block cipher into a nonce-based authenticated
encryption scheme (with associated data). The SCT mode combines in
a SIV-...
On the Security of Encryption Modes of MD4, MD5 and HAVAL
Security Encryption Modes MD4 MD5 HAVAL
font style='font-size:12px;'>
2009/3/5
Statistical Multiparty Computation Based on Random Walks on Graphs.
Statistical Testing for Disk Encryption Modes of Operations
Disk encryption modes of operations randomness AES
font style='font-size:12px;'>
2008/5/28
In this paper we present a group of statistical tests that
explore the random behavior of encryption modes of operations, when
used in disk encryption applications. The results of these tests help u...