搜索结果: 1-15 共查到“Misuse”相关记录26条 . 查询时间(0.125 秒)
CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption
AEAD AES-GCM AES-GCM-SIV
2019/8/6
We propose a new nonce-misuse-resistant authenticated encryption scheme, which instantiates the SIV paradigm of Rogaway and Shrimpton. In contrast to the GCM-SIV approach proposed by Gueron and Lindel...
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners
Fault Attacks DFA SPNs
2019/5/31
In this paper, we study DFA attacks on some of the CAESAR competition winners. We study the challenges imposed by the design of these modes, such as masking of the ciphertext. We also show that a very...
Many post-quantum cryptosystems which have been proposed in the National Institute of Standards and Technology (NIST) standardization process follow the same meta-algorithm, but in different algebras ...
mixFeed [CN19] is a round 1 candidate for the NIST Lightweight Cryptography Standardization Project. It is a single-pass, nonce-based, AES-based authenticated encryption algorithms. The authors claim ...
Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions
Leakage-resilience authenticated encryption leveled implementations
2018/5/28
We propose definitions and constructions of authenticated encryption (AE) schemes that offer security guarantees even in the presence of side-channel leakages and nonce misuse. This is part of an impo...
Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases
JAMBU CAESAR Competition Provable Security
2017/9/1
JAMBU is an AEAD mode of operation which entered the third round of CAESAR competition. However, it does not have a security proof like other modes of operation do, and there was a cryptanalysis resul...
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
cryptographic protocols Design Principles
2017/3/13
We develop foundations and several constructions for security protocols that can automatically detect, without false positives, if a secret (such as a key or password) has been misused. Such construct...
EHE: nonce misuse-resistant message authentication
message authentication authenticated encryption polynomial hashing
2017/3/9
We propose a nonce misuse-resistant message authentication scheme called EHE (Encrypt-Hash-Encrypt). In EHE, a message-dependent polynomial is evaluated at the point which is an encrypted nonce. The r...
Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models
Symmetric-key Cryptography Authenticated Encryption Online Encryption
2017/3/6
Real-world applications of authenticated encryption often require the encryption to be computable {online}, e.g. to compute the ithith block of ciphertext after having processed the first ii blocks of...
Leakage-Resilient and Misuse-Resistant Authenticated Encryption
secret-key cryptography leakage-resilience
2016/12/8
Leakage-resilience and misuse-resistance are two important properties for the deployment
of authenticated encryption schemes. They aim at mitigating the impact of implementation flaws due
to side-ch...
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
Wegman-Carter MAC Davies-Meyer construction nonce-misuse resistance
2016/5/30
We propose a nonce-based MAC construction called EWCDM (Encrypted Wegman-Carter with Davies-Meyer), based on an almost xor-universal hash function and a block cipher, with the following properties: (i...
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
modes of operation authenticated encryption nonce misuse resistance
2016/1/4
Authenticated encryption schemes guarantee both privacy
and integrity, and have become the default level of encryption in modern
protocols. One of the most popular authenticated encryption schemes
...
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
Authenticated encryption CAESAR competition misuse resistance
2016/1/3
A definition of online authenticated-encryption (OAE), call it OAE1, was given by Fleischmann,
Forler, and Lucks (2012). It has become a popular definitional target because, despite allowing encrypti...
Fish Story:Analysts See Nations’ Misuse of “Rational Use” When It Comes to Fishing Rights
Fish Story Rational Use Fishing Rights
2015/11/12
The term “rational use,” as applied to fishing rights in Antarctic waters, has been misused by certain countries, an analysis by a team of researchers has concluded. Its work, which comes ahead of the...
TOWARDS MANAGING THE RISKS OF DATA MISUSE FOR SPATIAL DATACUBES
Decision support Spatial OLAP Spatial data quality Warnings Legal Misuse Risk
2015/9/28
Over the years, the mass consumption of spatial data caused several concerns in the geomatics community about the risk of data to be misused, especially by people who have little expertise in spatial ...