搜索结果: 1-4 共查到“军队指挥学 Authenticated Cipher”相关记录4条 . 查询时间(0.093 秒)
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme
Authenticated Cipher COLM CPA
2019/8/22
Authenticated encryption schemes provide both confidentiality and integrity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, like all physical impl...
A realtime key recovery attack on the authenticated cipher FASER128
CAESAR stream ciphers FASER128
2016/1/23
FASER is a family of authenticated ciphers submitted to the CAESAR competition, which contains two parent ciphers: FASER128 and FASER256. In this work we only focus on FASER128 and present a key re...
A practical forgery and state recovery attack on the authenticated cipher PANDA-s
CAESAR PANDA state recovery attack
2016/1/23
PANDA is a family of authenticated ciphers submitted to CARSAR, which consists of two ciphers: PANDA-s and PANDA-b. In this work we present a state recovery attack against PANDA-s with time complex...
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
Lightweight cryptography authenticated encryption keyed sponge
2015/12/30
In this paper, we present a novel lightweight authenticated cipher optimized for
hardware implementations called Fides. It is an online nonce-based authenticated encryption
scheme with authenticated...