搜索结果: 1-13 共查到“军事学 CAESAR”相关记录13条 . 查询时间(0.093 秒)
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners
Fault Attacks DFA SPNs
2019/5/31
In this paper, we study DFA attacks on some of the CAESAR competition winners. We study the challenges imposed by the design of these modes, such as masking of the ciphertext. We also show that a very...
Improved Lightweight Implementations of CAESAR Authenticated Ciphers
Reconfigurable FPGA Lightweight
2018/6/6
Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Things (IoT). The CAESAR competition seeks optimal authenticated ciphers based on several criteria, in...
A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates
ASIC Implementation FPGA Authenticated Encryption
2018/1/2
Authenticated encryption with Associated Data (AEAD) plays a significant role in cryptography because of its ability to provide integrity, confidentiality and authenticity at the same time. Due to the...
Authenticated ciphers rely on the uniqueness of the nonces to meet their security goals. In this work, we investigate the implications of reusing nonces for three third-round candidates of the ongoing...
Under Pressure: Security of Caesar Candidates beyond their Guarantees
Authenticated Encryption CAESAR Competition Forgery
2017/11/28
The Competition for Authenticated Encryption: Security, Applicability and Robustness (CAESAR) has as its official goal to ``identify a portfolio of authenticated ciphers that offer advantages over AES...
Software Benchmarking of the 2$^{\text{nd}}$ round CAESAR Candidates
real-worlds usecases tls ssh
2016/12/12
The software performance of cryptographic schemes is an important factor in the decision to include such a scheme in real-world protocols like TLS, SSH or IPsec. In this paper, we develop a benchmarki...
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition
SAT solvers SAT-based cryptanalysis logic cryptanalysis
2016/12/7
We investigate six authenticated encryption schemes (ACORN, ASCON-128a, Ketje
Jr, ICEPOLE-128a, MORUS, and NORX-32) from the CAESAR competition. We
aim at state recovery attacks using a SAT solver a...
In this paper, we define the CAESAR hardware Application Programming Interface (API) for authenticated ciphers. In particular, our API is intended to meet the requirements of all algorithms submitted ...
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates
linear cryptanalysis authenticated encryption automated tools
2016/1/27
Differential and linear cryptanalysis are the general purpose
tools to analyze various cryptographic primitives. Both techniques have
in common that they rely on the existence of good differential o...
General Overview of the Authenticated Schemes for the First Round of the CAESAR Competition
authenticated encryption CAESAR competition symmetric cryptography
2016/1/6
The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer
advantages over AES-GCM and are suitable for widespread adoption. At the moment, 48 remaining first-round
s...
The BRUTUS automatic cryptanalytic framework: Testing CAESAR authenticated encryption candidates for weaknesses
Authenticated Encryption CAESAR BRUTUS
2016/1/6
This report summarizes our results from security analysis covering all 57 competitions for authenticated encryption: security, applicability, and robustness (CAESAR) first-round candidates and over 21...
Collision Attacks against CAESAR Candidates -- Forgery and Key-Recovery against AEZ and Marble
Thomas Fuhr Valentin Suder
2015/12/18
In this paper we study authenticated encryption algorithms
inspired by the OCB mode (Offset Codebook). These algorithms use
secret offsets (masks derived from a whitening key) to turn a block cipher...
A draft call for the CAESAR authenticated-encryption competition adopts an interface that is not aligned with existing definitions in the literature. It is the purpose of this brief note to formalize ...