搜索结果: 1-4 共查到“军队指挥学 Plaintext Recovery”相关记录4条 . 查询时间(0.109 秒)
Plaintext Recovery Attacks against XTS Beyond Collisions
XTS Storage encryption Mode of operation
font style='font-size:12px;'>
2019/7/17
XTS is an encryption scheme for storage devices standardized by IEEE and NIST. It is based on Rogaway's XEX tweakable block cipher and is known to be secure up to the collisions between the blocks, th...
Plaintext Recovery Attack of OCB2
OCB2 plaintext recovery attack chosen plaintext
font style='font-size:12px;'>
2018/11/12
Inoue and Minematsu [Cryptology ePrint Archive: Report 2018/1040] presented efficient forgery attacks against OCB2, and Poettering [Cryptology ePrint Archive: Report 2018/1087] presented a distinguish...
Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption
differential power analysis side-channel attack leakage-resilient encryption
font style='font-size:12px;'>
2016/12/7
Differential power analysis (DPA) is a powerful tool to extract the key of a cryptographic implementation from observing its power consumption during the en-/decryption of many different inputs. There...
Plaintext Recovery Attacks Against WPA/TKIP
secret-key cryptography
font style='font-size:12px;'>
2014/3/6
We conduct an analysis of the RC4 algorithm as it is used in the IEEE WPA/TKIP wireless standard. In that standard, RC4 keys are computed on a per-frame basis, with specific key bytes being set to kno...