搜索结果: 1-3 共查到“军队指挥学 authenticated encryption scheme”相关记录3条 . 查询时间(0.093 秒)
The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE
secret-key cryptography
2014/3/12
We show how to produce a forged (ciphertext,tag) pair for the scheme ALE with data and time complexity of 2^102 ALE encryptions of short messages and the same number of authentication attempts. We use...
Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm
Authenticated Encryption Secure Shell SSH
2009/4/14
The Secure Shell (SSH) protocol is one of the most popular cryptographic protocols on the
Internet. Unfortunately, the current SSH authenticated encryption mechanism is insecure. In
this paper, we p...
VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme
Authenticated Encryption MAC Stream Cipher
2009/4/1
A stream cipher based algorithm for computing Message Au-
thentication Codes is described. The algorithm employs the internal
state of the underlying cipher to minimize the required additional-to-
...