搜索结果: 1-9 共查到“军队指挥学 Tweakable Block Ciphers”相关记录9条 . 查询时间(0.063 秒)
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
Authenticated encryption beyond-birthday-bound security tweakable block- cipher
2019/4/3
Using a small block length is a common strategy in designing lightweight block cipher. So far, many 64-bit primitives have been proposed. However, if we use such a 64-bit primitive for an authenticate...
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Symmetric-key cryptography tweakable block ciphers zero-correlation
2019/3/1
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights. For instance, results of Kranz, Leander, ...
Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound
substitution-permutation networks tweakable block ciphers domain extension of block ciphers
2018/5/28
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a wnwn-bit (tweakable) block cipher from nn-bit public permutations. Many widely deployed block ciphers are part...
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing
Provable security ideal-cipher model tweakable block cipher
2017/11/13
Tweakable block ciphers are important primitives for designing cryptographic schemes with high security. In the absence of a standardized tweakable block cipher, constructions built from classical blo...
Efficient Length Doubling From Tweakable Block Ciphers
length doubler LDT tweakable block ciphers
2017/9/7
We present a length doubler, LDT, that turns an n-bit tweakable block cipher into an efficient and secure cipher that can encrypt any bit string of length [n..2n-1]. The LDT mode is simple, uses only ...
Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers
Deoxys AES authenticated encryption
2017/7/24
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deox...
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
Linear Cryptanalysis Key Schedule Hypothesis of Independent Round Keys
2017/2/23
This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insights in the areas of key schedule design and tweakable block ciphers. We examine in a step by step ma...
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
authenticated encryption tweakable block cipher nonce-misuse resistance
2015/12/21
We propose the Synthetic Counter-in-Tweak (SCT) mode,
which turns a tweakable block cipher into a nonce-based authenticated
encryption scheme (with associated data). The SCT mode combines in
a SIV-...
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
tweakable block cipher modes of operations AE MAC AEAD
2008/9/18
his work builds on earlier work by Rogaway at Asiacrypt 2004 on tweakable block cipher (TBC) and modes of operations. Our first contribution is to generalize Rogaway’s TBC construction by working over...