军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 CBC相关记录15条 . 查询时间(0.156 秒)
Decentralised ledgers are a prime application case for consensus protocols. Changing sets of validators have to agree on a set of transactions in an asynchronous network and in the presence of Byzanti...
This paper proposes a highly efficient AES hardware architecture that supports both encryption and decryption for the CBC mode. Some conventional AES architectures employ pipelining techniques to enha...
We examine the IND-qCPA security of the wide-spread block cipher modes of operation CBC, CFB, OFB, CTR, and XTS (i.e., security against quantum adversaries doing queries in superposition). We show t...
In Crypto'05, Bellare et al. proved O(Гq2/2n) bound for the PRF (pseudorandom function) security of the CBC-MAC based on an n-bit random permutation バ, provided Г<2n/3. Here an adversary can make at m...
We provide further evidence that implementing software countermeasures against timing attacks is a non-trivial task and requires domain-specific software development processes: we report an implement...
The tight analysis of keyed sponges is our main result and we see this as an important step in validating SHA-3-based authentication before its deployment. Still, our analysis crucially relies on the ...
In this paper, we first present a new distinguisher on the CBC-MAC based on a block cipher in Cipher Block Chaining (CBC) mode. It can also be used to distinguish other CBC-like MACs from random fu...
OMAC: One-Key CBC MAC     CBC MAC  block cipher  provable security       2009/4/15
In this paper, we present One-key CBC MAC (OMAC) and prove its security for arbitrary length messages. OMAC takes only one key, K (k bits) of a block cipher E. Previously, XCBC requires three keys,...
TMAC: Two-Key CBC MAC     TMAC  Two-Key CBC  MAC       2009/4/14
TMAC: Two-Key CBC MAC.
Vaudenay [1] has presented an attack on the CBC mode of block ciphers, which uses padding according to the PKCS#5 standard. One of the countermeasures, which he has assumed, consisted of the encrypt...
Vaudenay has shown in [5] that a CBC encryption mode ([2], [9]) combined with the PKCS#5 padding [3] scheme allows an attacker to invert the underlying block cipher, provided she has access to a vali...
In this paper we compute the coliision probability of CBC-MAC [3] for suitably chosen messages. We show that the probability is ­(`q2=N) where ` is the number of message block, N is the size of ...
In Crypto 2001, Bellare et al. [1] introduced online cipher (or online permutation) and proposed two Hash-CBC mode constructions, namely HCBC and HPCBC along with security proofs. We observe that, t...
We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of large and varying lengths and will output the ith block of the ciphertext after having processed only the f...
The security of interchanged use of modes of operation of block ciphers have not been discussed in the public literature. So far, the modes of operation of block ciphers have been treated as completel...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...