نتایج جستجو برای: caesar competition

تعداد نتایج: 86460  

Journal: :International Journal of Computer Applications 2013

1997
Artur Ekert

1 What is wrong with classical cryptography ? Human desire to communicate secretly is at least as old as writing itself and goes back to the beginnings of our civilisation. Methods of secret communication were developed by many ancient societies, including those of Mesopotamia, Egypt, India, and China, but details regarding the origins of cryptology remain unknown (Kahn 1967). We know that it w...

Journal: :Expert Syst. Appl. 2016
Mike Kestemont Justin Anthony Stover Moshe Koppel Folgert Karsdorp Walter Daelemans

In this paper, we shed new light on the authenticity of the Corpus Caesarianum, a group of five commentaries describing the campaigns of Julius Caesar (100-44 BC), the founder of the Roman empire. While Caesar himself has authored at least part of these commentaries, the authorship of the rest of the texts remains a puzzle that has persisted for nineteen centuries. In particular, the role of Ca...

2015
Jérémy Jean Yu Sasaki Lei Wang

In this paper, we present the first third-party cryptanalysis against the authenticated encryption scheme Silver. In high-level, Silver builds a tweakable block cipher by tweaking AES-128 with a dedicated method and performs a similar computation as OCB3 to achieve 128bit security for both of integrity and confidentiality in nonce-respecting model. Besides, by modifying the tag generation of OC...

ΑΕS _ CMCCv₁, ΑVΑLΑNCHEv₁, CLΟCv₁, and SILCv₁ are four candidates of the first round of CAESAR. CLΟCv₁ is presented in FSE 2014 and SILCv₁ is designed upon it with the aim of optimizing the hardware implementation cost. In this paper, structural weaknesses of these candidates are studied. We present distinguishing attacks against ΑES  _ CMCCv₁ with the complexity of two queries and the success ...

2000
James Higginbotham Fabio Pianesi Achille C. Varzi

We speak of actions and other events with the same easiness with which we speak of people and other objects. We say of John that he is bright and of Bill's lecture that it is boring. We say of John's father that he is taller than Bill's and of John's life that it is better than Bill's. We say of Clark Kent that he is Superman and of Clark Kent's death that it is the death of Superman. The perva...

2016
Ekawat Homsirikamol Kris Gaj Jens-Peter Kaps Angelos Stavrou

The growing number of candidates competing in the cryptographic contests, such as SHA-3 and CAESAR, makes the hardware performance evaluation extremely time consuming, tedious, and imprecise, especially at the early stages of the competitions. The main difficulties include the long time necessary to develop and verify Register-Transfer Level (RTL), hardware description language code of all cand...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید