搜索结果: 1-3 共查到“军事学 keyed sponges”相关记录3条 . 查询时间(0.062 秒)
Key Prediction Security of Keyed Sponges
outer-keyed sponge full-keyed sponge key prediction
2018/5/22
The keyed sponge is a well-accepted method for message authentication. It processes data at a certain rate by sequential evaluation of an underlying permutation. If the key size kk is smaller than the...
New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length
PRF XOF game playing
2016/3/18
We provide new bounds for the pseudo-random function security
of keyed sponge constructions. For the case c ≤ b/2 (c the capacity
and b the permutation size), our result improves over all previously...
The tight analysis of keyed sponges is our main result and we see this as an important step in validating SHA-3-based authentication before its deployment. Still, our analysis crucially relies on the ...