搜索结果: 1-6 共查到“军事学 AES-GCM”相关记录6条 . 查询时间(0.165 秒)
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds
Multi-user security AES-GCM-SIV authenticated encryption
2018/2/8
This paper revisits the multi-user (mu) security of symmetric encryption, from the perspective of delivering an analysis of the AES-GCM-SIV AEAD scheme. Our end result shows that its mu security is co...
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption scheme currently considered for standardization by the Crypto Forum Research Group (CFRG). First, we p...
AES-GCM-SIV: Specification and Analysis
modes of operation nonce-misuse resistance security bounds
2017/2/24
In this paper, we describe and analyze the security of the AES-GCM-SIV mode of operation, as defined in the CFRG specification \cite{CFRG}. This mode differs from the original GCM-SIV mode that was de...
The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3
authenticated encryption TLS 1.3 multi-user security
2016/6/6
We initiate the study of multi-user (mu) security of authenticated encryption (AE) schemes as
a way to rigorously formulate, and answer, questions about the “randomized nonce” mechanism
proposed for...
The fragility of AES-GCM authentication algorithm
AES-GCM GHASH polynomial evaluation MAC message forgery OpenSSL
2013/4/18
A new implementation of the GHASH function has been recently committed to a Git version of OpenSSL, to speed up AES-GCM. We identified a bug in that implementation, and made sure it was quickly fixed ...
We present a bitsliced implementation of AES encryption in counter mode for 64-bit
Intel processors. Running at 7.81 cycles/byte on a Core 2, it is up to 25% faster than previous
implementations, wh...