搜索结果: 1-15 共查到“军队指挥学 CBC”相关记录15条 . 查询时间(0.1 秒)
Decentralised ledgers are a prime application case for consensus protocols. Changing sets of validators have to agree on a set of transactions in an asynchronous network and in the presence of Byzanti...
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths --- Toward Efficient CBC-Mode Implementation
AES hardware architectures unified encryption/decryption processors
2016/6/8
This paper proposes a highly efficient AES hardware architecture that supports both encryption and decryption for the CBC mode. Some conventional AES architectures employ pipelining techniques to enha...
Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
Post-quantum cryptography Block ciphers Modes of operation
2016/2/25
We examine the IND-qCPA security of the wide-spread block cipher modes of operation
CBC, CFB, OFB, CTR, and XTS (i.e., security against quantum adversaries doing queries
in superposition). We show t...
Revisiting Structure Graph and Its Applications to CBC-MAC and EMAC
CBC EMAC structure graph
2016/2/23
In Crypto'05, Bellare et al. proved O(Гq2/2n) bound for the PRF (pseudorandom function) security of the CBC-MAC based on an n-bit random permutation バ, provided Г<2n/3. Here an adversary can make at m...
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC
TLS MEE-CBC Timing attacks
2016/1/26
We provide further evidence that implementing software countermeasures against timing attacks
is a non-trivial task and requires domain-specific software development processes: we report an implement...
The tight analysis of keyed sponges is our main result and we see this as an important step in validating SHA-3-based authentication before its deployment. Still, our analysis crucially relies on the ...
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs
CBC MAC Distinguishing attack
2009/6/11
In this paper, we first present a new distinguisher on the
CBC-MAC based on a block cipher in Cipher Block Chaining (CBC)
mode. It can also be used to distinguish other CBC-like MACs from
random fu...
In this paper, we present One-key CBC MAC (OMAC) and
prove its security for arbitrary length messages. OMAC takes only one
key, K (k bits) of a block cipher E. Previously, XCBC requires three
keys,...
Vaudenay [1] has presented an attack on the CBC mode of block ciphers, which uses padding
according to the PKCS#5 standard. One of the countermeasures, which he has assumed,
consisted of the encrypt...
Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format
CBC symmetrical encryption padding
2009/4/9
Vaudenay has shown in [5] that a CBC encryption mode ([2], [9]) combined with the PKCS#5 padding [3]
scheme allows an attacker to invert the underlying block cipher, provided she has access to a vali...
An improved collision probability for CBC-MAC and PMAC
MAC CBC-MAC PMAC Distinguishing attack
2008/9/18
In this paper we compute the coliision probability of CBC-MAC [3] for suitably chosen
messages. We show that the probability is (`q2=N) where ` is the number of message block, N
is the size of ...
A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher
random permutation pseudo random permutation Online function
2008/9/1
In Crypto 2001, Bellare et al. [1] introduced online cipher (or online permutation) and
proposed two Hash-CBC mode constructions, namely HCBC and HPCBC along with security
proofs. We observe that, t...
On-Line Ciphers and the Hash-CBC Constructions
Ciphers pseudorandom permutations universal hash functions
2008/8/26
We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of
large and varying lengths and will output the ith block of the ciphertext after having processed only the f...
On the insecurity of interchanged use of OFB and CBC modes of operation
block ciphers modes of operation quasigroup string transformations
2008/5/26
The security of interchanged use of modes of operation of block ciphers have not been discussed in the public literature. So far, the modes of operation of block ciphers have been treated as completel...