搜索结果: 1-7 共查到“军队指挥学 counter mode”相关记录7条 . 查询时间(0.062 秒)
The Missing Difference Problem, and its Applications to Counter Mode Encryption
Modes of operation CTR GCM
font style='font-size:12px;'>
2018/3/7
To achieve this result, we study a simple algorithmic problem related to the security of the CTR mode: the missing difference problem. We give efficient algorithms for this problem in two practically ...
Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)
cryptanalysis time-memory tradeoff attacks block ciphers
font style='font-size:12px;'>
2018/2/3
In this paper, we consider the implications of parallelizing time-memory tradeoff attacks using a large number of distributed processors. It is shown that Hellman’s original tradeoff method and the Bi...
Authentication Key Recovery in Galois/Counter Mode (GCM)
Secret-key Cryptography Message Authentication Codes Block Ciphers
font style='font-size:12px;'>
2015/12/30
GCM is used in a vast amount of security protocols and is quickly becoming the de facto mode of operation for block ciphers. In this paper we suggest several novel improvements to Fergusons’s authenti...
SGCM: The Sophie Germain Counter Mode
Authenticated Encryption GCM Sophie Germain Counter Mode
font style='font-size:12px;'>
2012/3/27
Sophie Germain Counter Mode (SGCM) is an authenticated encryption mode of operation, to be used with 128-bit block ciphers such as AES. SGCM is a variant of the NIST standardized Galois / Counter Mode...
The Analysis of Galois Substitution Counter Mode(GSCM)
Galois Substitution Counter Mode GSCM GCM
font style='font-size:12px;'>
2009/6/12
In [9], GSCM mode of operation for authenticated encryption
was presented. GSCM is based on the Galois/
Counter Mode (GCM). GSCM is an enhancement of
GCM, which is characterized by its high through...
The Security and Performance of the Galois/Counter Mode(GCM)of Operation
Security Galois/Counter Mode GCM Operation
font style='font-size:12px;'>
2009/3/27
The recently introduced Galois/Counter Mode (GCM) of operation
for block ciphers provides both encryption and message authentication,
using universal hashing based on multiplication in a binary fini...
High Speed Architecture for Galois/Counter Mode of Operation(GCM)
High Speed Architecture Galois/Counter Mode GCM
font style='font-size:12px;'>
2009/2/7
In this paper we present a fully pipelined high speed hardware architecture
for Galois/Counter Mode of Operation (GCM) by analyzing the data
dependencies in the GCM algorithm at the architecture lev...