[图书][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …
Generic attacks against beyond-birthday-bound MACs
In this work, we study the security of several recent MAC constructions with provable security
beyond the birthday bound. We consider block-cipher based constructions with a double …
beyond the birthday bound. We consider block-cipher based constructions with a double …
The missing difference problem, and its applications to counter mode encryption
G Leurent, F Sibleyras - Advances in Cryptology–EUROCRYPT 2018: 37th …, 2018 - Springer
The counter mode (CTR) is a simple, efficient and widely used encryption mode using a
block cipher. It comes with a security proof that guarantees no attacks up to the birthday …
block cipher. It comes with a security proof that guarantees no attacks up to the birthday …
Security analysis of the RaSTA safety protocol
M Heinrich, J Vieten, T Arul… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
RaSTA is a transport protocol that has been designed to be deployed in the safety-critical
domain of railway signalling. The protocol provides safety properties such as message …
domain of railway signalling. The protocol provides safety properties such as message …
Functional graphs and their applications in generic attacks on iterated hash constructions
We provide a survey about generic attacks on cryptographic hash constructions including
hash-based message authentication codes and hash combiners. We look into attacks …
hash-based message authentication codes and hash combiners. We look into attacks …
Method and system for securing communication
G Fielder - US Patent 9,882,883, 2018 - Google Patents
A method for generating one or more secrets for use by members. The method includes
sending a first request for connection with a second member, and sending a second request …
sending a first request for connection with a second member, and sending a second request …
Comparative Study of Eight Formal Specifications of the Message Authenticator Algorithm
H Garavel, L Marsso - arXiv preprint arXiv:1803.10322, 2018 - arxiv.org
The Message Authenticator Algorithm (MAA) is one of the first cryptographic functions for
computing a Message Authentication Code. Between 1987 and 2001, the MAA was adopted …
computing a Message Authentication Code. Between 1987 and 2001, the MAA was adopted …
Cryptanalyse des algorithmes de chiffrement symétrique
C Chaigneau - 2018 - theses.fr
La sécurité des transmissions et du stockage des données est devenue un enjeu majeur de
ces dernières années et la cryptologie, qui traite de la protection algorithmique de …
ces dernières années et la cryptologie, qui traite de la protection algorithmique de …
Cryptanalysis of symmetric encryption algorithms
C Chaigneau - 2018 - theses.hal.science
Nowadays, cryptology is heavily used to protect stored and transmitted data against
malicious attacks, by means of security algorithms. Cryptology comprises cryptography, the …
malicious attacks, by means of security algorithms. Cryptology comprises cryptography, the …
Constructions pour la cryptographie à bas coût
S Duval - 2018 - inria.hal.science
Cette thèse explore à la fois la construction et l'analyse de primitives de cryptographie
symétrique. Nous obtenons de meilleures constructions que celles de la littérature, en visant …
symétrique. Nous obtenons de meilleures constructions que celles de la littérature, en visant …