A Critique of CCM

نویسندگان

  • Phillip Rogaway
  • David A. Wagner
چکیده

CCM is a conventional authenticated-encryption scheme obtained from a 128-bit block cipher. The mechanism has been adopted as the mandatory encryption algorithm in an IEEE 802.11 draft stan­ dard [15], and its use has been proposed more broadly [16, 17]. In this note we point out a number of limitations of CCM. A related note provides an alternative to CCM [5].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fractional Modeling and Analysis of Buck Converter in CCM Mode Peration

In this paper fractional order averaged model for DC/DC Buck converter in continues condition mode (CCM) operation is established. DC/DC Buck converter is one of the main components in the wind turbine system which is used in this research. Due to some practical restriction there weren’t exist input voltage and duty cycle of converter therefor whole of the wind system was simulated in Matlab/Si...

متن کامل

Quality of Sick Child-Care Delivered by Community Health Workers in Tanzania

Background Community health worker (CHW) interventions to manage childhood illness is a strategy promoted by the global health community which involves training and supporting CHW to assess, classify and treat sick children at home, using an algorithm adapted from the Integrated Management of Childhood Illness (IMCI). To inform CHW policy, the Government of Tanzania launched a program in ...

متن کامل

تحلیل انتقادی مطالعات پژوهشی در علوم پزشکی

An intellectual critique of researches is a fundamental procedure through which knowledge promotion may be achieved. Different aspects of the subject should be sought. There are several points that made the critique of studies an important activity. These include: student critique, critique in order to process findings, verbal critique following the verbal research presentation, written critiqu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2003  شماره 

صفحات  -

تاریخ انتشار 2003