搜索结果: 1-6 共查到“军事学 IEC”相关记录6条 . 查询时间(0.046 秒)
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
Post-quantum cryptosystems Isogeny-based cryptosystems CSIDH
2019/9/17
ISO/IEC standardizes several chosen ciphertext-secure key encapsulation mechanism (KEM) schemes in ISO/IEC 18033-2. However, all ISO/IEC KEM schemes are not quantum resilient. In this paper, we introd...
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2
Group signature Cryptanalysis ISO/IEC 20008-2 SGX
2019/3/18
In ISO/IEC 20008-2, several anonymous digital signature schemes are specified. Among these, the scheme denoted as Mechanism 6, is the only plain group signature scheme that does not aim at providing a...
The international standard ISO/IEC 9797-1:2011 specifies six versions of MACs, called MAC Algorithm 1-6, and many of these MACs enjoy widespread use in practical applications. However, security guaran...
Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs
ANSI X9.24-1:2009 key check value ISO/IEC 9797-1:2011
2016/1/25
ANSI X9.24-1:2009 specifies the key check value, which is used to verify the integrity
of the blockcipher key. This value is defined as the most significant bits of the ciphertext of the zero
block,...
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures
digital signatures forgery rsa
2009/6/12
In 1999, Coron, Naccache and Stern discovered an existential signature forgery for two popular
rsa signature standards, iso/iec 9796-1 and 2. Following this attack iso/iec 9796-1 was withdrawn. iso/i...
Attacks On An ISO/IEC 11770-2 Key Establishment Protocol
Attacks ISO/IEC 11770-2 Key Establishment Protocol
2009/3/27
Two possible types of attack (a replay attack and a type attack) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two solutions are proposed.