搜索结果: 1-15 共查到“CBC”相关记录19条 . 查询时间(0.109 秒)
Refinement and Verification of CBC Casper
blockchain consensus protocol proof-of-stake
font style='font-size:12px;'>
2019/4/25
Decentralised ledgers are a prime application case for consensus protocols. Changing sets of validators have to agree on a set of transactions in an asynchronous network and in the presence of Byzanti...
第一届中国计算机学会生物信息学会议(CBC 2016)征文通知(第一轮)
中国计算机学会 生物信息学 会议 通知
font style='font-size:12px;'>
2016/8/25
由中国计算机学会(CCF)主办的第一届年生物信息学学术会议(The First CCF Bioinformatics Conference,简称CBC 2016)旨在是为从事生物信息学研究的专家、学者和学生提供一个学术交流平台,促进我国生物信息学领域的学术交流与研究合作。会议将于2016年11月11-11月13日在重庆市召开,由CCF生物信息学专业组和西南大学承办,重庆大学、第三军医大学、重庆邮电...
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths --- Toward Efficient CBC-Mode Implementation
AES hardware architectures unified encryption/decryption processors
font style='font-size:12px;'>
2016/6/8
This paper proposes a highly efficient AES hardware architecture that supports both encryption and decryption for the CBC mode. Some conventional AES architectures employ pipelining techniques to enha...
Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
Post-quantum cryptography Block ciphers Modes of operation
font style='font-size:12px;'>
2016/2/25
We examine the IND-qCPA security of the wide-spread block cipher modes of operation
CBC, CFB, OFB, CTR, and XTS (i.e., security against quantum adversaries doing queries
in superposition). We show t...
Revisiting Structure Graph and Its Applications to CBC-MAC and EMAC
CBC EMAC structure graph
font style='font-size:12px;'>
2016/2/23
In Crypto'05, Bellare et al. proved O(Гq2/2n) bound for the PRF (pseudorandom function) security of the CBC-MAC based on an n-bit random permutation バ, provided Г<2n/3. Here an adversary can make at m...
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
TLS MEE-CBC Timing attacks
font style='font-size:12px;'>
2016/1/26
We provide further evidence that implementing software countermeasures against timing attacks
is a non-trivial task and requires domain-specific software development processes: we report an implement...
Tight Bounds for Keyed Sponges and Truncated CBC
Message-authentication sponges CBC-MAC
font style='font-size:12px;'>
2016/1/4
The tight analysis of keyed sponges is our main result and we see this as an important step in validating SHA-3-based authentication before its deployment. Still, our analysis crucially relies on the ...
为解决异构无线传感器网络密钥管理方案所需负载较大和大规模节点被俘获后的安全隐患问题,提出了一种新的密钥管理方案,采用随机数生成和分组链接技术建立会话密钥,通过在不同簇内广播不同的阶段标志来增加网络的安全性。理论分析和仿真实验表明,该方案能够利用较低的存储负载获得较高的密钥连通性,同时能够解决大规模节点被俘获而带来的安全问题。
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs
CBC MAC Distinguishing attack
font style='font-size:12px;'>
2009/6/11
In this paper, we first present a new distinguisher on the
CBC-MAC based on a block cipher in Cipher Block Chaining (CBC)
mode. It can also be used to distinguish other CBC-like MACs from
random fu...
OMAC: One-Key CBC MAC
CBC MAC block cipher provable security
font style='font-size:12px;'>
2009/4/15
In this paper, we present One-key CBC MAC (OMAC) and
prove its security for arbitrary length messages. OMAC takes only one
key, K (k bits) of a block cipher E. Previously, XCBC requires three
keys,...
TMAC: Two-Key CBC MAC
TMAC Two-Key CBC MAC
font style='font-size:12px;'>
2009/4/14
TMAC: Two-Key CBC MAC.
Strengthened Encryption in the CBC Mode
block ciphers block-cipher modes CBC
font style='font-size:12px;'>
2009/4/14
Vaudenay [1] has presented an attack on the CBC mode of block ciphers, which uses padding
according to the PKCS#5 standard. One of the countermeasures, which he has assumed,
consisted of the encrypt...
Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format
CBC symmetrical encryption padding
font style='font-size:12px;'>
2009/4/9
Vaudenay has shown in [5] that a CBC encryption mode ([2], [9]) combined with the PKCS#5 padding [3]
scheme allows an attacker to invert the underlying block cipher, provided she has access to a vali...
An improved collision probability for CBC-MAC and PMAC
MAC CBC-MAC PMAC Distinguishing attack
font style='font-size:12px;'>
2008/9/18
In this paper we compute the coliision probability of CBC-MAC [3] for suitably chosen
messages. We show that the probability is (`q2=N) where ` is the number of message block, N
is the size of ...
A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher
random permutation pseudo random permutation Online function
font style='font-size:12px;'>
2008/9/1
In Crypto 2001, Bellare et al. [1] introduced online cipher (or online permutation) and
proposed two Hash-CBC mode constructions, namely HCBC and HPCBC along with security
proofs. We observe that, t...