军事学 >>> 军事学 >>> 军队指挥学 >>> 作战指挥 军事系统工程 军事通信学 军事情报学 密码学 军队指挥学其他学科
搜索结果: 1-8 共查到军队指挥学 sponges相关记录8条 . 查询时间(0.078 秒)
Sponges Resist Leakage: The Case of Authenticated Encryption     AEAD  Leakage Resilience  Side Channels       font style='font-size:12px;'> 2019/9/17
In this work we advance the study of leakage-resilient Authenticated Encryption with Associated Data (AEAD) and lay the theoretical groundwork for building such schemes from sponges. Building on the w...
Quantum Indistinguishability of Random Sponges     Symmetric cryptography  keyed sponges  indistinguishability       font style='font-size:12px;'> 2019/1/26
In this work we show that the sponge construction can be used to construct quantum-secure pseudorandom functions. As our main result we prove that random sponges are quantum indistinguishable from ran...
Key Prediction Security of Keyed Sponges     outer-keyed sponge  full-keyed sponge  key prediction       font style='font-size:12px;'> 2018/5/22
The keyed sponge is a well-accepted method for message authentication. It processes data at a certain rate by sequential evaluation of an underlying permutation. If the key size kk is smaller than the...
We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengtheni...
We provide new bounds for the pseudo-random function security of keyed sponge constructions. For the case c ≤ b/2 (c the capacity and b the permutation size), our result improves over all previously...
Sponges and Engines: An introduction to Keccak and Keyak     Keccak  Keyak  SHA-3       font style='font-size:12px;'> 2016/1/27
In this document we present an introductory overview of the algorithms and design components underlying the Keccac cryptographic primitive and the Keyak encryption scheme for authenticated (session-...
In this paper, we investigate the properties of iterative non-injective functions and the security of primitives where they are used. First, we introduce the Collision Probability Spectrum (CPS) param...
Tight Bounds for Keyed Sponges and Truncated CBC     Message-authentication  sponges  CBC-MAC       font style='font-size:12px;'> 2016/1/4
The tight analysis of keyed sponges is our main result and we see this as an important step in validating SHA-3-based authentication before its deployment. Still, our analysis crucially relies on the ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...