[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

Generic attacks against beyond-birthday-bound MACs

G Leurent, M Nandi, F Sibleyras - Annual International Cryptology …, 2018 - Springer
In this work, we study the security of several recent MAC constructions with provable security
beyond the birthday bound. We consider block-cipher based constructions with a double …

The missing difference problem, and its applications to counter mode encryption

G Leurent, F Sibleyras - Advances in Cryptology–EUROCRYPT 2018: 37th …, 2018 - Springer
The counter mode (CTR) is a simple, efficient and widely used encryption mode using a
block cipher. It comes with a security proof that guarantees no attacks up to the birthday …

Security analysis of the RaSTA safety protocol

M Heinrich, J Vieten, T Arul… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
RaSTA is a transport protocol that has been designed to be deployed in the safety-critical
domain of railway signalling. The protocol provides safety properties such as message …

Functional graphs and their applications in generic attacks on iterated hash constructions

Z Bao, J Guo, L Wang - Cryptology ePrint Archive, 2018 - eprint.iacr.org
We provide a survey about generic attacks on cryptographic hash constructions including
hash-based message authentication codes and hash combiners. We look into attacks …

Method and system for securing communication

G Fielder - US Patent 9,882,883, 2018 - Google Patents
A method for generating one or more secrets for use by members. The method includes
sending a first request for connection with a second member, and sending a second request …

Comparative Study of Eight Formal Specifications of the Message Authenticator Algorithm

H Garavel, L Marsso - arXiv preprint arXiv:1803.10322, 2018 - arxiv.org
The Message Authenticator Algorithm (MAA) is one of the first cryptographic functions for
computing a Message Authentication Code. Between 1987 and 2001, the MAA was adopted …

Cryptanalyse des algorithmes de chiffrement symétrique

C Chaigneau - 2018 - theses.fr
La sécurité des transmissions et du stockage des données est devenue un enjeu majeur de
ces dernières années et la cryptologie, qui traite de la protection algorithmique de …

Cryptanalysis of symmetric encryption algorithms

C Chaigneau - 2018 - theses.hal.science
Nowadays, cryptology is heavily used to protect stored and transmitted data against
malicious attacks, by means of security algorithms. Cryptology comprises cryptography, the …

Constructions pour la cryptographie à bas coût

S Duval - 2018 - inria.hal.science
Cette thèse explore à la fois la construction et l'analyse de primitives de cryptographie
symétrique. Nous obtenons de meilleures constructions que celles de la littérature, en visant …