搜索结果: 1-10 共查到“密码学 Encrypt”相关记录10条 . 查询时间(0.046 秒)
Reconsidering Generic Composition: the Tag-then-Encrypt case
Authenticated Encryption generic composition tag-then-encrypt
2018/11/5
Authenticated Encryption (AEAE) achieves confidentiality and authenticity, the two most fundamental goals of cryptography, in a single scheme. A common strategy to obtain AEAE is to combine a Message ...
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC
EDMEDM EWCDMEWCDM Mirror Theory
2018/5/28
Encrypt-Augment-Recover: Computationally Function Private Predicate Encryption in the Public-Key Setting
Predicate Encryption Public-Key Function Privacy
2017/4/17
We solve the open problem of constructing \emph{computationally function private} public-key predicate encryption schemes. Existing public-key constructions for predicate encryption satisfy a \emph{st...
DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report
homomorphic encryption lattice-based cryptography
2015/12/23
We give a theoretical description of a new homomorphic encryption
scheme DA-Encrypt that is based on (non-archimedean) Diophantine
Approximation.
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt''
public-key cryptography signcryption
2014/3/13
Signcryption simultaneously offers authentication through unforgeability and confidentiality through indistinguishability against chosen ciphertext attacks by combining the functionality of digital si...
Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
Side-Channel Resistant Block Cipher Usage Side-Channel Countermeasures
2010/1/18
Based on re-keying techniques by Abdalla, Bellare, and Borst [1, 2], we consider two black-box
secure block cipher based symmetric encryption schemes, which we prove secure in the physically observab...
Resettable Public-Key Encryption:How to Encrypt on a Virtual Machine
Resettable Public-Key Encryption Encrypt Virtual Machine
2009/9/27
Typical security models used for proving security of deployed cryptographic primitives do
not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is common to see
crypt...
Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm
Authenticated Encryption Secure Shell SSH
2009/4/14
The Secure Shell (SSH) protocol is one of the most popular cryptographic protocols on the
Internet. Unfortunately, the current SSH authenticated encryption mechanism is insecure. In
this paper, we p...
Building Secure Cryptographic Transforms, or How to Encrypt and MAC
Applied cryptography cryptographic transforms authenticated encryption
2009/4/9
We describe several notions of “cryptographic transforms,” symmetric schemes designed to
meet a variety of privacy and authenticity goals. We consider goals, such as replay-avoidance
and in-order pa...
Stateful Public-Key Cryptosystems:How to Encrypt with One 160-bit Exponentiation
Public-Key Cryptosystems Encrypt 160-bit Exponentiation
2008/12/10
We show how to significantly speed-up the encryption portion of some public-key cryptosystems
by the simple expedient of allowing a sender to maintain state that is re-used across
different encrypti...