搜索结果: 1-10 共查到“军队指挥学 Message recovery”相关记录10条 . 查询时间(0.138 秒)
Message-Recovery MACs and Verification-Unskippable AE
message recovery MACs authenticated encryption unskippability
font style='font-size:12px;'>
2017/3/27
This paper explores a new type of MACs called message-recovery MACs (MRMACs). MRMACs have an additional input RR that gets recovered upon verification. Receivers must execute verification in order to ...
Message-recovery attacks on Feistel-based Format Preserving Encryption
Format-preserving encryption attacks
font style='font-size:12px;'>
2016/12/10
We give attacks on Feistel-based format-preserving encryption (FPE) schemes that succeed in message recovery (not merely distinguishing scheme outputs from random) when the message space is small. For...
Honey Encryption Beyond Message Recovery Security
secret-key cryptography HE
font style='font-size:12px;'>
2016/2/24
Juels and Ristenpart introduced honey encryption (HE) and showed how to achieve message
recovery security even in the face of attacks that can exhaustively try all likely keys. This is
important in ...
A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing
Proxy signature certificate-based message recovery
font style='font-size:12px;'>
2016/1/26
In this paper, we propose the first provable secure certificate-based proxy signature with message
recovery without bilinear pairing. The notion of certificate-based cryptography was initially
intro...
On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers
Data Complexity Distinguisher Distinguishing Attack
font style='font-size:12px;'>
2015/12/18
We revisit the different approaches used in the literature to estimate the data complexity of distinguishing
attacks on stream ciphers and analyze their inter-relationships. In the process, we formal...
Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256
Hash functions SHA-3 competition cryptanalysis
font style='font-size:12px;'>
2010/2/20
Hamsi is one of the second round candidates of the SHA-3
competition. In this study, we present non-random differential properties
for the compression function of the hash function Hamsi-256. Based
...
A New Blind Identity-Based Signature Scheme with Message Recovery
Blind Identity Based Signature Scheme Message Recovery
font style='font-size:12px;'>
2009/6/2
Anonymity of consumers is an essential
functionality that should be supported in e-cash systems,
locations based services, electronic voting systems as well as
digital rights management system. Pri...
Forgery Attacks on Chang et al:'s signature scheme with message recovery
Digital signature message recovery cryptanalysis
font style='font-size:12px;'>
2009/3/27
It is found that Chang et al:'s signature scheme with message recovery is not as secure as they
claimed, in fact. In this letter, two forgery attacks is proposed to show that the signature can be for...
Cryptanalysis of Chang et al.’s Signature Scheme with Message Recovery
Digital signature message recovery message redundancy schemes
font style='font-size:12px;'>
2009/3/27
Recently, Chang et al. [1] proposed a new digital signature
scheme with message recovery and claimed that neither one-way hash
functions nor message redundancy schemes were employed in their scheme....
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing
CDH problem Identity-based signature Message recovery Pairing
font style='font-size:12px;'>
2008/11/27
Signature schemes with message recovery have been wildly
investigated a decade ago in the literature, but the first ID-based signature
with message recovery goes out into the world until 2005. In th...