搜索结果: 1-6 共查到“军队指挥学 Ideal cipher model”相关记录6条 . 查询时间(0.151 秒)
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
secret-key cryptography / Related-key attack Ideal-cipher model Blockcipher
2012/3/28
Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictability and collision-resistance) on ...
The Security of Abreast-DM in the Ideal Cipher Model
hash function provable security collision resistance
2009/6/15
In this paper, we give a security proof for Abreast-DM in
terms of collision resistance, preimage resistance and adaptive preimage
resistance. As old as Tandem-DM, the compression function Abreast-
...
The Random Oracle Model and the Ideal Cipher Model are Equivalent
Random Oracle Model Ideal Cipher Model Equivalent
2009/6/5
The Random Oracle Model and the Ideal Cipher Model are two well known idealised
models of computation for proving the security of cryptosystems. At Crypto 2005, Coron et al.
showed that security in ...
The Ideal-Cipher Model, Revisited:An Uninstantiable Blockcipher-Based Hash Function
Ideal-Cipher Model Information-Theoretic Cryptography Random-Oracle Model
2009/2/17
The Ideal-Cipher Model of a blockcipher is a well-known and widely-used model
dating back to Shannon [24] and has seen frequent use in proving the security of various
cryptographic objects and proto...
A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions
Hash Function Collision Attack Block Cipher
2009/1/9
Recently, Shoichi Hirose [2] proposed several double block
length (DBL) hash functions. Each DBL hash function uses a constant
which has a role to make the DBL hash function collision-resistant in
...
The Collision Intractability of MDC-2 in the Ideal Cipher Model
Collision Intractability MDC-2 Ideal Cipher Model
2008/12/16
The Collision Intractability of MDC-2 in the Ideal Cipher Model.