搜索结果: 1-7 共查到“军队指挥学 Tweakable Enciphering Schemes”相关记录7条 . 查询时间(0.037 秒)
Breaking Tweakable Enciphering Schemes using Simon's Algorithm
TES Simon's algorithm Quantum period finding algorithm
2019/6/19
The threat of the possible advent of quantum computers has motivated the cryptographic community to search for quantum safe solutions. There have been some works in past few years showing the vulnerab...
FAST: A New Family of Secure and Efficient Tweakable Enciphering Schemes
tweakable enciphering schemes pseudo-random function Horner
2017/9/13
This work describes a new family of cryptographic constructions called FAST. Several instantiations of FAST are described. These are targeted towards two goals, the specific task of disk encryption on...
Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes
implementation / Pipelined architecture tweakable enciphering schemes Karatsuba multiplier disc encryption polynomial evaluation
2012/3/29
A new class of polynomials was introduced by Bernstein (Bernstein 2007) which were later named by Sarkar as Bernstein-Rabin-Winograd (BRW) polynomials (Sarkar 2009). For the purpose of authentication,...
Tweakable Enciphering Schemes From Stream Ciphers With IV
stream cipher with IV tweakable encryption disk encryption
2009/7/14
We present the first construction of a tweakable enciphering scheme from a stream cipher
supporting an initialization vector. This construction can take advantage of the recent advances in
hardware ...
Tweakable Enciphering Schemes Using Only the Encryption Function of a Block Cipher
modes of operations tweakable encryption strong pseudorandom permutation
2009/6/12
A new construction of block cipher based tweakable enciphering schemes (TES) is described.
The major improvement over existing TES is that the construction uses only the encryption function
of the u...
Efficient Tweakable Enciphering Schemes from(Block-Wise)Universal Hash Functions
modes of operations tweakable encryption strong pseudo-random permutation
2009/6/2
We present several constructions of tweakable enciphering schemes which use a single encryption
layer between two layers of universal hash function computation. The earliest known construction
of th...
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Reconfigurable Hardware Tweakable Enciphering Schemes
2008/5/22
Tweakable enciphering schemes are length preserving block cipher modes of operation that provide a strong pseudo-random permutation. It has been suggested that these schemes can be used as the main bu...