搜索结果: 1-5 共查到“军队指挥学 Keyak”相关记录5条 . 查询时间(0.027 秒)
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Fault Attack Statistical Ineffective Fault Attack SIFA
2018/11/15
In the context of fault attacks on nonce-based authenticated encryption, an attacker faces two restrictions. The first is the uniqueness of the nonce for each new encryption that prevents the attacker...
Conditional Cube Attack on Round-Reduced River Keyak
secret-key encryption round-reduced River Keyak
2017/10/19
This paper evaluates the security level of the River Keyak against the cube-like attack. River Keyak is the only lightweight scheme of the Keccak-permutation-based Authenticated Encryption Cipher Keya...
In the quantum model, by utilizing the Simon's algorithm, we propose an efficient universal forgery attack to FKS, FKD and Keyak with complexity of O(c)O(c). Moreover, we also propose an efficient key...
In this document we present an introductory overview of the algorithms
and design components underlying the Keccac cryptographic primitive
and the Keyak encryption scheme for authenticated (session-...
Simple AEAD Hardware Interface (S艸I) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor
Cryptographic coprocessor System-on-Chip Keccak
2016/1/8
Simple AEAD Hardware Interface (S艸I) is a hardware cryptographic interface aimed at CAESAR Authenticated Encryption with Associated Data (AEAD) algorithms. Cryptographic acceleration is typically achi...