Security of Symmetric Primitives under Incorrect Usage of Keys
نویسندگان
چکیده
منابع مشابه
Security of Symmetric Primitives under Incorrect Usage of Keys
We study the security of symmetric primitives under the incorrect usage of keys. Roughly speaking, a key-robust scheme does not output ciphertexts/tags that are valid with respect to distinct keys. Key-robustness is a notion that is often tacitly expected/assumed in protocol design — as is the case with anonymous auction, oblivious transfer, or public-key encryption. We formalize simple, yet st...
متن کاملOn the Round Security of Symmetric-Key Cryptographic Primitives
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of iterating simpler constructs for a number of rounds, and may provide insight into the security of such designs. We completely characterize the security of four-round Luby-Rackoff ciphers in our model, and show that t...
متن کاملdegradation of oil impregnated paper insulation under influence of repetitive fast high voltage impulses
در طی سالهای اخیراستفاده ازمنابع انرژی تجدید پذیر در شبکه های مدرن بنا به دلایل زیست محیطی و اقتصادی به طور گسترده استفاده شده است همچون نیروگاههای بادی و خورشیدی .ولتاژتولیدی این نیروگاهها اغلب به فرم dc می باشد وادوات الکترونیک قدرت به عنوان مبدل و پل بین شکل موج dc وac استفاده می شوند.این پروسه باعث ایجاد پالسهایی برروی شکل موج خروجی می شود که می تواند وارد تجهیزات قدرت همچون ترانسفورماتور ی...
15 صفحه اولAlgebraic Cryptanalysis of Symmetric Primitives
The information in this document is provided as is, and no warranty is given or implied that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability.
متن کاملCryptanalysis of Symmetric Cryptographic Primitives
Cryptanalysis of Symmetric Cryptographic Primitives Aleksandar Kircanski, Ph.D. Concordia University, 2013 Symmetric key cryptographic primitives are the essential building blocks in modern information security systems. The overall security of such systems is crucially dependent on these mathematical functions, which makes the analysis of symmetric key primitives a goal of critical importance. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR Transactions on Symmetric Cryptology
سال: 2017
ISSN: 2519-173X
DOI: 10.46586/tosc.v2017.i1.449-473