搜索结果: 1-14 共查到“军事学 forgery attack”相关记录14条 . 查询时间(0.062 秒)
Lilliput-AE is a tweakable block cipher submitted as a candidate to the NIST lightweight cryptography standardization process. It is based upon the lightweight block cipher Lilliput, whose cryptanalys...
mixFeed [CN19] is a round 1 candidate for the NIST Lightweight Cryptography Standardization Project. It is a single-pass, nonce-based, AES-based authenticated encryption algorithms. The authors claim ...
This document includes a collision/forgery attack against SNEIKEN128/192/256, where every message with more than 128 bytes of associated data can be converted into another message with different assoc...
Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate
Dilithium Lattice based cryptography Digital Signatures
2018/11/19
The recent lattice-based signature scheme Dilithium, submitted as part of the CRYSTALS (Cryptographic Suite for Algebraic Lattices) package, is one of a number of strong candidates submitted for the N...
Breaking Into the KeyStore: A Practical Forgery Attack Against Android KeyStore
Android KeyStore authenticated encryption integrity
2016/7/7
We analyze the security of Android KeyStore, a system service whose purpose is to shield users credentials and cryptographic keys. The KeyStore protects the integrity and the confidentiality of keys b...
PANDA is an authenticated encryption scheme designed by Ye
et al., and submitted to the CAESAR competition. The designers claim
that PANDA-s, which is one of the designs of the PANDA-family, provide...
A Practical Universal Forgery Attack against PAES-8
PAES-8 Universal Forgery Attack Nonce Misuse
2016/1/25
PAES is an authenticated encryption scheme designed by Ye
et al., and submitted to the CAESAR competition. The designers claim
that PAES-8, which is one of the designs of the PAES-family, provides
...
Generic Universal Forgery Attack on Iterative Hash-based MACs
HMAC NMAC hash function universal forgery
2016/1/9
In this article, we study the security of iterative hash-based MACs, such as HMAC
or NMAC, with regards to universal forgery attacks. Leveraging recent advances in the analysis
of functional graphs ...
On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack
Authenticated encryption algorithm COPA Marble
2016/1/4
COPA is a block-cipher-based authenticated encryption mode
with a provable birthday-bound security under the assumption that the
underlying block cipher is a strong pseudorandom permutation, and its...
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE
authenticated encryption forgery attack ALE
2016/1/4
ALE is a new authenticated encryption algorithm published at FSE 2013. The
authentication component of ALE is based on the strong Pelican MAC, and the authentication
security of ALE is claimed to be...
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE
authenticated encryption forgery attack ALE
2016/1/4
ALE is a new authenticated encryption algorithm published at FSE 2013. The
authentication component of ALE is based on the strong Pelican MAC, and the authentication
security of ALE is claimed to be...
Birthday Forgery Attack on 128-EIA3 Version 1.5
secret-key cryptography / Message Authentication Code
2012/3/28
128-EIA3 is an integrity algorithm considered for adoption as a third integrity algorithm by European Telecommunication Standard Institute (ETSI) for 4th generation of GSM networks.128-EIA3 is vul- ne...
Birthday Forgery Attack on 128-EIA3 Version 1.5
secret-key cryptography Message Authentication Code
2011/6/9
128-EIA3 is an integrity algorithm considered for adoption as a third integrity algorithm by European Telecommunication Standard Institute (ETSI) for 4th generation of GSM networks.128-EIA3 is vul- ne...
A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3
message authentication codes forgery attacks
2010/12/9
In this note we show that the message authentication code 128-EIA3 considered for adoption as one of the integrity algorithms of the emerging mobile standard LTE is vulnerable to a simple existential ...