نتایج جستجو برای: CAESAR Competition

تعداد نتایج: 86460  

Journal: :IACR Cryptology ePrint Archive 2016
Frédéric Lafitte Liran Lerman Olivier Markowitch Dirk Van Heule

The CAESAR competition aims to provide a portfolio of authenticated encryption algorithms. SAT solvers represent powerful tools to verify automatically and efficiently (among others) the confidentiality and the authenticity of information claimed by cryptographic primitives. In this work, we study the security of the CAESAR candidate Acorn against a SAT-based cryptanalysis. We provide the first...

2013
HakJu Kim Kwangjo Kim

Cryptographic primitives are required to protect an IT (Information Technology) system. They are used to provide CIA (Confidentiality, Integrity, and Availability) and other security attributes to the system. So far, NIST (National Institute of Standard and Technology) has successfully standardized AES (Advanced Encryption Standard) for confidentiality and SHA (Secure Hash Algorithm) for integr...

Journal: :IACR Cryptology ePrint Archive 2013
Chanathip Namprempre Phillip Rogaway Thomas Shrimpton

A draft call for the CAESAR authenticated-encryption competition adopts an interface that is not aligned with existing definitions in the literature. It is the purpose of this brief note to formalize what we believe to be the intended definitions.

2014
Elena Andreeva Andrey Bogdanov Atul Luykx Bart Mennink Elmar Tischhauser Kan Yasuda

2013
Alexander Ferrein Tim Niemüller Stefan Schiffer Gerhard Lakemeyer

In this paper we outline the development of CAESAR, a domestic service robot with which we participated in the robot competition RoboCup@Home for many years. We sketch the system components, in particular the parts relevant to the high-level reasoning system, that make CAESAR an intelligent robot. We report on the development and discuss the lessons we learnt over the years designing, developin...

2016
Ekawat Homsirikamol Kris Gaj

We provide the first hardware implementation of AEZ, a third-round candidate to the CAESAR competition for authenticated encryption. Complex, optimized for software, and impossible to implement in a single pass, AEZ poses significant obstacles for any hardware realization. Still, we find that a hardware implementation of AEZ is quite feasible. On Xilinx Virtex-6 FPGAs, our single-core design ha...

Journal: :Computer Science Review 2016
Farzaneh Abed Christian Forler Stefan Lucks

An Authenticated encryption scheme is a scheme which provides privacy and integrity by using a secret key. In 2013, CAESAR (the “Competition for Authenticated Encryption: Security, Applicability, and Robustness”) was co-founded by NIST and Dan Bernstein with the aim of finding authenticated encryption schemes that offer advantages over AES-GCM and are suitable for widespread adoption. The first...

2017
Xavier Bonnetain

AEZ is an authenticated encryption algorithm, submitted to the CAESAR competition. It has been selected for the third round of the competition. While some classical analysis on the algorithm have been published, the cost of these attacks is beyond the security claimed by the designers. In this paper, we show that all the versions of AEZ are completely broken against a quantum adversary. For thi...

Journal: :IACR Cryptology ePrint Archive 2017
Serge Vaudenay Damian Vizár

The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as its official goal to “identify a portfolio of authenticated ciphers that offer advantages over AES-GCM and are suitable for widespread adoption.” Each of the 15 candidate schemes competing in the currently ongoing 3rd round of CAESAR must clearly declare its security claims, i.a. whether or not ...

2014
Hossein HOSSEINI Shahram KHAZAEI Hossein Hosseini Shahram Khazaei

This paper presents the Code-Book Authentication mode (CBA), a submission to the CAESAR competition for authenticated encryption. CBA is a blockcipher mode of encryption that provides confidentiality and authenticity for plaintexts and authenticity for associated data. The proposed mode improves the OCB mode in the sense that it saves up to one blockcipher call to encrypt and authenticate the p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید