搜索结果: 1-5 共查到“军事学 Authenticated Ciphers”相关记录5条 . 查询时间(0.064 秒)
The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer advantages over AES-GCM for several use-cases, including lightweight applications. ACORN and Ascon are the tw...
Improved Lightweight Implementations of CAESAR Authenticated Ciphers
Reconfigurable FPGA Lightweight
2018/6/6
Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Things (IoT). The CAESAR competition seeks optimal authenticated ciphers based on several criteria, in...
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers
Cryptography authenticated cipher field programmable gate array
2018/4/17
Authenticated ciphers, like all physical implementations of cryptography, are vulnerable to side-channel attacks, including differential power analysis (DPA). The t-test leakage detection methodology ...
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition
SAT solvers SAT-based cryptanalysis logic cryptanalysis
2016/12/7
We investigate six authenticated encryption schemes (ACORN, ASCON-128a, Ketje
Jr, ICEPOLE-128a, MORUS, and NORX-32) from the CAESAR competition. We
aim at state recovery attacks using a SAT solver a...
In this paper, we propose a universal hardware Application
Programming Interface (API) for authenticated ciphers. In particular,
our API is intended to meet the requirements of all algorithms submit...