Analysis of One-pass Block Cipher Based Authenticated Encryption Schemes

ثبت نشده
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking

Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

The EAX Mode of Operation (A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Ef£ciency)

We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryptionwith associated-data (AEAD). Given a nonce N , a message M , and a header H , our mode protects theprivacy of M and the authenticity of both M and H . Strings N , M , and H are arbitrary bit strings, andthe mode uses 2d|M |/ne + d|H|/ne + d|N |/ne block-cipher calls when these string...

متن کامل

The EAX Mode of Operation (A Two-Pass Authenticated-Encryption Scheme Optimized for Simplicity and Efficiency)

We propose a block-cipher mode of operation, EAX, for solving the problem of authenticated-encryptionwith associated-data (AEAD). Given a nonce N , a message M , and a header H , our mode protects theprivacy of M and the authenticity of both M and H . Strings N , M , and H are arbitrary bit strings, andthe mode uses 2 |M |/n + |H|/n + |N |/n block-cipher calls when these strings are...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015