搜索结果: 1-7 共查到“军事学 Encryption Modes”相关记录7条 . 查询时间(0.107 秒)
Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes
side channel analysis fault attack authenticated encryption
2017/7/28
The XOR-Encrypt-XOR (XEX) block cipher mode was introduced by Rogaway in 2004. XEX mode uses nonce-based secret masks (L)(L) that are distinct for each message. The existence of secret masks in XEX mo...
Practical Fault Attacks on Authenticated Encryption Modes for AES
fault attacks authenticated encryption CAESAR
2016/6/17
Since the first demonstration of fault attacks by Boneh et
al. on RSA, a multitude of fault attack techniques on various cryptosystems
have been proposed. Most of these techniques, like Differential...
AES-Based Authenticated Encryption Modes in Parallel High-Performance Software
Authenticated encryption AES-NI pclmulqdq
2016/1/25
Authenticated encryption (AE) has recently gained renewed interest due to the
ongoing CAESAR competition. This paper deals with the performance of block cipher modes
of operation for AE in parallel ...
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
Authenticated encryption CAESAR Ascon
2016/1/9
The Sponge function is known to achieve 2^{c/2} security, where c is its capacity. This bound was carried over to keyed variants of the function, such as SpongeWrap, to achieve a min{2^{c/2},2^kappa} ...
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
authenticated encryption tweakable block cipher nonce-misuse resistance
2015/12/21
We propose the Synthetic Counter-in-Tweak (SCT) mode,
which turns a tweakable block cipher into a nonce-based authenticated
encryption scheme (with associated data). The SCT mode combines in
a SIV-...
On the Security of Encryption Modes of MD4, MD5 and HAVAL
Security Encryption Modes MD4 MD5 HAVAL
2009/3/5
Statistical Multiparty Computation Based on Random Walks on Graphs.
Statistical Testing for Disk Encryption Modes of Operations
Disk encryption modes of operations randomness AES
2008/5/28
In this paper we present a group of statistical tests that
explore the random behavior of encryption modes of operations, when
used in disk encryption applications. The results of these tests help u...