搜索结果: 1-15 共查到“密码学 Operation”相关记录30条 . 查询时间(0.062 秒)
SPAE a mode of operation for AES on low-cost hardware
secret-key cryptography AES block ciphers
2019/9/16
We propose SPAE, a single pass, patent free, authenticated encryption with associated data (AEAD) for AES. The algorithm has been developped to address the needs of a growing trend in IoT systems: sto...
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation
Lightweight cryptography authenticated encryption with associated data blockciphe
2019/6/14
Lightweight cryptography in computationally constrained devices is actively studied. In contrast to advances of lightweight blockcipher in the last decade, lightweight mode of operation is seemingly n...
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
Authenticated encryption beyond-birthday-bound security tweakable block- cipher
2019/4/3
Using a small block length is a common strategy in designing lightweight block cipher. So far, many 64-bit primitives have been proposed. However, if we use such a 64-bit primitive for an authenticate...
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation
modes of operation key derivation nonce-misuse resistance
2017/7/24
Block cipher modes of operation provide a way to securely encrypt using a block cipher. The main factors in analyzing modes of operation are the level of security achieved (chosen-plaintext security, ...
Modes of Operation Suitable for Computing on Encrypted Data
secret-key cryptography OTR mode
2017/6/2
We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multi-party computation engine. These two modes are selected because...
BLAKE2 is a hash function introduced at ACNS 2013, which has been adopted in many constructions and applications. It is a successor to the SHA-3 finalist BLAKE, which received a significant amount of ...
Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
Post-quantum cryptography Block ciphers Modes of operation
2016/2/25
We examine the IND-qCPA security of the wide-spread block cipher modes of operation
CBC, CFB, OFB, CTR, and XTS (i.e., security against quantum adversaries doing queries
in superposition). We show t...
New bit-parallel Montgomery multiplier for trinomials using squaring operation
Montgomery multiplication squaring bit-parallel
2016/1/23
In this paper, a new bit-parallel Montgomery multiplier for GF(2m) is presented, where the field is generated with an irreducible trinomial. We first present a slightly generalized version of a newly...
Automated Analysis and Synthesis of Block-Cipher Modes of Operation
modes of operation synthesis
2016/1/7
Block ciphers such as AES are deterministic, keyed functions that operate on small, fixed-size blocks.
Block-cipher modes of operation define a mechanism for probabilistic encryption of arbitrary len...
Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes
Pseudorandom functions Even-Mansour Constructions Lower Bound Proofs in the Random Oracle Model
2015/12/29
In the last years, much research work has been invested into the security analysis of key alternating ciphers in the random oracle model. These are pseudorandom permutations (PRPs), sometimes also cal...
Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks
Stream Cipher Operation Modes Time-Memory-Data Tradeoff Attacks Provable Security
2015/12/24
Most stream ciphers used in practice are vulnerable against generic collision attacks,
which allow to compute the secret initial state on the basis of O(2n/2
) keystream bits in
time and space O(2n...
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
Authentication Proof of Retrievability Secure Cloud Storage
2011/7/25
In cloud storage service, users upload their data together with authentication information to cloud storage server.
Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
cryptographic protocols / Authentication Proof of Retrievability Secure Cloud Storage Secure Delegation of Auditing
2012/3/28
In cloud storage service, users upload their data together with authentication information to cloud storage server. To ensure the availability and integrity of users' data stored in the cloud storage,...
Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation
Multi-property-preserving Domain Extension Polynomial-based Modes Operation
2010/3/16
In this paper, we propose a new double-piped mode of operation for multi-
property-preserving domain extension of MACs (message authentication codes), PRFs (pseu-
dorandom functions) and PROs (pseud...
New Addition Operation and Its Application for Scalar Multiplication on Hessian Curves over
Elliptic curve cryptosystem scalar multiplication Hessian curves
2009/12/29
In this paper, we present a new addition operation on Hessian curves
with low cost. It can be applied to resist the side channel attacks for scalar
multiplication, and also can be used to compute pr...