搜索结果: 1-9 共查到“军事学 misuse resistant”相关记录9条 . 查询时间(0.031 秒)
CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption
AEAD AES-GCM AES-GCM-SIV
2019/8/6
We propose a new nonce-misuse-resistant authenticated encryption scheme, which instantiates the SIV paradigm of Rogaway and Shrimpton. In contrast to the GCM-SIV approach proposed by Gueron and Lindel...
EHE: nonce misuse-resistant message authentication
message authentication authenticated encryption polynomial hashing
2017/3/9
We propose a nonce misuse-resistant message authentication scheme called EHE (Encrypt-Hash-Encrypt). In EHE, a message-dependent polynomial is evaluated at the point which is an encrypted nonce. The r...
Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
Symmetric-key Cryptography Authenticated Encryption Online Encryption
2017/3/6
Real-world applications of authenticated encryption often require the encryption to be computable {online}, e.g. to compute the ithith block of ciphertext after having processed the first ii blocks of...
Leakage-Resilient and Misuse-Resistant Authenticated Encryption
secret-key cryptography leakage-resilience
2016/12/8
Leakage-resilience and misuse-resistance are two important properties for the deployment
of authenticated encryption schemes. They aim at mitigating the impact of implementation flaws due
to side-ch...
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
Wegman-Carter MAC Davies-Meyer construction nonce-misuse resistance
2016/5/30
We propose a nonce-based MAC construction called EWCDM (Encrypted Wegman-Carter with Davies-Meyer), based on an almost xor-universal hash function and a block cipher, with the following properties: (i...
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
modes of operation authenticated encryption nonce misuse resistance
2016/1/4
Authenticated encryption schemes guarantee both privacy
and integrity, and have become the default level of encryption in modern
protocols. One of the most popular authenticated encryption schemes
...
The authenticated encryptions which resist misuse of initial value (or nonce) at some desired level of privacy are two-pass or Mac-then-Encrypt constructions (inherently inefficient but provide full p...
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
Authenticated encryption symmetric encryption random oracles
2012/3/28
This paper provides a comprehensive treatment of the security of authenticated encryption (AE) in the presence of key-dependent data, considering the four variants of the goal arising from the choice ...
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
Authenticated encryption symmetric encryption random oracles
2011/6/9
This paper provides a comprehensive treatment of the security of authenticated encryption (AE) in the presence of key-dependent data, considering the four variants of the goal arising from the choice ...