نتایج جستجو برای: caesar competition

تعداد نتایج: 86460  

Journal: :IACR Cryptology ePrint Archive 2014
Andrey Bogdanov Martin M. Lauridsen Elmar Tischhauser

Authenticated encryption (AE) has recently gained renewed interest due to the ongoing CAESAR competition. This paper deals with the performance of block cipher modes of operation for AE in parallel software. We consider the example of the AES on Intel’s new Haswell microarchitecture that has improved instructions for AES and finite field multiplication. As opposed to most previous high-performa...

2016
Tomer Ashur Bart Mennink

One of the submissions to the CAESAR competition for the design of a new authenticated encryption scheme is Offset Merkle-Damg̊ard (OMD). At FSE 2015, Reyhanitabar et al. introduced p-OMD, an improvement of OMD that processes the associated data almost for free. As an extra benefit, p-OMD was claimed to offer integrity against nonce-misusing adversaries, a property that OMD does not have. In thi...

2018
Long-Huei Chen Kshitiz Tripathi

Comprehending meaning from natural language is a primary objective of Natural Language Processing (NLP), and text comprehension is the cornerstone for achieving this objective upon which all other problems like chat bots, language translation and others can be achieved. We report a Summary-Attentive Reader we designed to better emulate the human reading process, along with a dictiontarybased so...

Journal: :IACR Cryptology ePrint Archive 2015
Mohamed Ahmed Abdelraheem Peter Beelen Andrey Bogdanov Elmar Tischhauser

Polynomial hashing as an instantiation of universal hashing is a widely employed method for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous GCM being a prominent example. It is also used in recent AE proposals within the CAESAR competition which aim at providing nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise...

2017
Lorenzo Grassi Christian Rechberger Sondre Rønjom

AES is probably the most widely studied and used block cipher. Also versions with a reduced number of rounds are used as a building block in many cryptographic schemes, e.g. several candidates of the CAESAR competition are based on it. So far, non-random properties which are independent of the secret key are known for up to 4 rounds of AES. These include differential, impossible differential, a...

2016
Nasour Bagheri Tao Huang Keting Jia Florian Mendel Yu Sasaki

NORX is a second round candidate of the ongoing CAESAR competition for authenticated encryption. It is a nonce based authenticated encryption scheme based on the sponge construction. Its two variants denoted by NORX32 and NORX64 provide a security level of 128 and 256 bits, respectively. In this paper, we present a state/key recovery attack for both variants with the number of rounds of the cor...

2014
Dhiman Saha Sukhendu Kuila Dipanwita Roy Chowdhury

This work presents an adaptation of the classical diagonal fault attack on APE which is a member of the PRIMATEs family of authenticated encryption (AE) schemes. APE is the rst nonce misuseresistant permutation based AE scheme and is one of the submissions to the CAESAR competition. In this work we showcase how nonce reuse can be misused in the context of di erential fault analysis of on-line a...

Journal: :SAGVNTVM. Papeles del Laboratorio de Arqueología de Valencia 2015

2006
ALASTAIR FRASER

Six groups of neurosecretory cells were identified in the brain of the mature larva of Lucilia caesar. Five of these groups belonged to the category of medial neurosecretory cells and one to that of lateral neurosecretory cells. The groups differ in position, cell size, staining characteristics, and sequence of activity. It is apparent that only some of the groups are concerned with the process...

2015
NATHAN B. OMAN

The study of law and religion has tended to focus on debates over “church and state.” The central question has been how the law ought to structure the relationship between religion and the government. Many of the legal conflicts over religion, however, take place in a commercial context. They are thus not simply puzzles of how God and Caesar should interact. They also present the question of ho...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید