搜索结果: 1-6 共查到“军队指挥学 authenticity”相关记录6条 . 查询时间(0.068 秒)
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher
Leakage-resilience authenticated encryption leveled implementation
2019/5/9
This paper presents CONCRETE (Commit-Encrypt-Send-the-Key) a new Authenticated Encryption mode that offers CIML2 security, that is, ciphertext integrity in the presence of nonce misuse and side-channe...
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality
OCB2 Authenticated Encryption Cryptanalysis
2019/3/21
We present practical attacks on OCB2. This mode of operation of a blockcipher was designed with the aim to provide particularly efficient and provably-secure authenticated encryption services, and sin...
A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption
PKG IND CCA
2017/3/6
ID based generalized signcryption can adaptively work as a signature scheme, an encryption scheme or a signcryption scheme and avoid weighty and complicated certificate management like Public Key Infr...
Improved Authenticity Bound of EAX, and Refinements
Authenticated encryption EAX security bound
2014/3/5
EAX is a mode of operation for blockciphers to implement an authenticated encryption. The original paper of EAX proved that EAX is unforgeable up to $O(2^{n/2})$ data with one verification query. Howe...
Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity
secret-key cryptography / Information-theoretic security non-malleability relations among notions of security
2012/3/29
Roughly speaking, an encryption scheme is said to be non-malleable, if no adversary can modify a ciphertext so that the resulting message is meaningfully related to the original message. We compare th...
Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity
Characterization information-theoretic non-malleability secrecy authenticity
2011/3/10
Roughly speaking, an encryption scheme is said to be non-malleable, if
no adversary can modify a ciphertext so that the resulting message is mean-
ingfully related to the original message. We compar...