搜索结果: 1-8 共查到“Authenticated encryption algorithm”相关记录8条 . 查询时间(0.203 秒)
Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication
Enigma Machine authenticated encryption polyalphabetic cipher
font style='font-size:12px;'>
2019/5/21
Enigma 2000 (E2K) is a cipher that updates the World War II-era Enigma Machine for the twenty-first century. Like the original Enigma, E2K is intended to be computed by an offline device; this prevent...
ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication
low-tech ciphers authenticated encryption
font style='font-size:12px;'>
2017/4/24
ElsieFour (LC4) is a low-tech cipher that can be computed by hand; but unlike many historical ciphers, LC4 is designed to be hard to break. LC4 is intended for encrypted communication between humans o...
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm
Authenticated encryption CAESAR ELmD
font style='font-size:12px;'>
2016/6/22
In this paper, we provide a security analysis of ELmD: a block cipher based Encrypt-Linear-mix-Decrypt authentication mode. As being one of the second-round CAESAR candidate, it is claimed to provide ...
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE
authenticated encryption forgery attack ALE
font style='font-size:12px;'>
2016/1/4
ALE is a new authenticated encryption algorithm published at FSE 2013. The
authentication component of ALE is based on the strong Pelican MAC, and the authentication
security of ALE is claimed to be...
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE
authenticated encryption forgery attack ALE
font style='font-size:12px;'>
2016/1/4
ALE is a new authenticated encryption algorithm published at FSE 2013. The
authentication component of ALE is based on the strong Pelican MAC, and the authentication
security of ALE is claimed to be...
Cryptanalysis of the Authenticated Encryption Algorithm COFFE
COFFE Authenticated cipher Forgery Attack
font style='font-size:12px;'>
2015/12/24
COFFE is a hash-based authenticated encryption scheme. In the original paper,
it was claimed to have IND-CPA security and also ciphertext integrity even in nonce-misuse
scenario. In this paper, we a...
AEGIS: A Fast Authenticated Encryption Algorithm
Authenticated encryption AEGIS AES-NI
font style='font-size:12px;'>
2014/3/6
This paper introduces a dedicated authenticated encryption algorithm AEGIS; AEGIS allows for the protection of associated data which makes it very suitable for protecting network packets. AEGIS-128L u...
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird cipher constrained devices lightweight cryptography ISO 18000-6C
font style='font-size:12px;'>
2012/3/29
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message processed. Like it's pre...