搜索结果: 1-9 共查到“军事学 modes of operation”相关记录9条 . 查询时间(0.14 秒)
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation
modes of operation key derivation nonce-misuse resistance
2017/7/24
Block cipher modes of operation provide a way to securely encrypt using a block cipher. The main factors in analyzing modes of operation are the level of security achieved (chosen-plaintext security, ...
Modes of Operation Suitable for Computing on Encrypted Data
secret-key cryptography OTR mode
2017/6/2
We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multi-party computation engine. These two modes are selected because...
BLAKE2 is a hash function introduced at ACNS 2013, which has been adopted in many constructions and applications. It is a successor to the SHA-3 finalist BLAKE, which received a significant amount of ...
Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
Post-quantum cryptography Block ciphers Modes of operation
2016/2/25
We examine the IND-qCPA security of the wide-spread block cipher modes of operation
CBC, CFB, OFB, CTR, and XTS (i.e., security against quantum adversaries doing queries
in superposition). We show t...
Automated Analysis and Synthesis of Block-Cipher Modes of Operation
modes of operation synthesis
2016/1/7
Block ciphers such as AES are deterministic, keyed functions that operate on small, fixed-size blocks.
Block-cipher modes of operation define a mechanism for probabilistic encryption of arbitrary len...
Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation
Multi-property-preserving Domain Extension Polynomial-based Modes Operation
2010/3/16
In this paper, we propose a new double-piped mode of operation for multi-
property-preserving domain extension of MACs (message authentication codes), PRFs (pseu-
dorandom functions) and PROs (pseud...
Recently, Jutla suggested two new modes of operation for block ciphers. These modes build
on traditional CBC and ECB modes, respectively, but add to them masking of the outputs and
inputs. Jutla pro...
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
Blockcipher Modes Operation Birthday Bound Security
2008/11/26
In this paper, we define and analyze a new blockcipher mode of operation for
encryption, CENC, which stands for Cipher-based ENCryption. CENC has the following
advantages: (1) beyond the birthday bo...
On the insecurity of interchanged use of OFB and CBC modes of operation
block ciphers modes of operation quasigroup string transformations
2008/5/26
The security of interchanged use of modes of operation of block ciphers have not been discussed in the public literature. So far, the modes of operation of block ciphers have been treated as completel...