搜索结果: 1-10 共查到“军事学 forgery attacks”相关记录10条 . 查询时间(0.065 秒)
Practical Forgery Attacks on Limdolen and HERN
NIST lightweight cryptography standardization project AEAD Limdolen
2019/8/8
In this paper, we investigate the security of Limdolen and HERN which are Round 1 submissions of the ongoing NIST Lightweight Cryptography Standardization Project. We show that some non-conservative d...
FlexAEAD is one of the round-1 candidates in the ongoing NIST Lightweight Cryptography standardization project. In this note, we show several forgery attacks on FlexAEAD with complexity less than the ...
Tweaking Generic OTR to Avoid Forgery Attacks
Authenticated encryption OTR confidentiality
2018/1/19
This paper considers the security of the Offset Two-Round (OTR) authenticated encryption mode \cite{cryptoeprint:2013:628} with respect to forgery attacks. The current version of OTR gives a security ...
We investigate nonce reuse issues with the GCM block cipher mode as used in TLS and focus in particular on AES-GCM, the most widely deployed variant. With an Internet-wide scan we identified 184 HTTPS...
Twisted Polynomials and Forgery Attacks on GCM
Authenticated encryption polynomial hashing twisted polynomial ring (Ore ring)
2016/1/27
Polynomial hashing as an instantiation of universal hashing
is a widely employed method for the construction of MACs and authenticated
encryption (AE) schemes, the ubiquitous GCM being a prominent
...
Forgery Attacks on round-reduced ICEPOLE-128
CAESAR ICEPOLE forgery differential cryptanalysis
2015/12/31
ICEPOLE is a family of authenticated encryptions schemes
submitted to the ongoing CAESAR competition and in addition presented
at CHES 2014. To justify the use of ICEPOLE, or to point out potential
...
On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes
Universal Hashing MAC Galois/Counter Mode Cycling Attacks Weak Keys
2013/4/18
Universal hash functions are commonly used primitives for fast and secure message authentication in the form of Message Authentication Codes (MACs) or Authenticated Encryption with Associated Data (AE...
Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC
Distinguishing attack Forgery attack Alred construction
2009/6/10
In this paper, we present new distinguishers of the MAC con-
struction Alred and its specific instance Alpha-MAC based on AES,
which is proposed by Daemen and Rijmen in 2005. For the Alred con-
str...
Forgery Attacks on Chang et al:'s signature scheme with message recovery
Digital signature message recovery cryptanalysis
2009/3/27
It is found that Chang et al:'s signature scheme with message recovery is not as secure as they
claimed, in fact. In this letter, two forgery attacks is proposed to show that the signature can be for...
Multiple forgery attacks against Message Authentication Codes
Multiple forgery attacks Message Authentication Codes MACs
2009/2/9
Some message authentication codes (MACs) are vulnerable to multiple forgery attacks, in which an attacker can gain information that allows her to succeed in forging multiple message/tag pairs. This pr...