搜索结果: 1-8 共查到“universal forgery”相关记录8条 . 查询时间(0.046 秒)
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions
MergeMAC universal forgery multiple forgeries
2018/9/6
This article presents universal forgery and multiple forgeries against MergeMAC that has been recently proposed to fit scenarios where bandwidth is limited and where strict time constraints apply. Mer...
In the quantum model, by utilizing the Simon's algorithm, we propose an efficient universal forgery attack to FKS, FKD and Keyak with complexity of O(c)O(c). Moreover, we also propose an efficient key...
Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions
Universal forgery birthday attack CBC-MAC
2017/7/6
We also propose another some generic universal forgery attacks using collision finding with structural input messages, by birthday paradox in the classic setting. Since our attacks are based on the co...
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm
Authenticated encryption CAESAR ELmD
2016/6/22
In this paper, we provide a security analysis of ELmD: a block cipher based Encrypt-Linear-mix-Decrypt authentication mode. As being one of the second-round CAESAR candidate, it is claimed to provide ...
A Practical Universal Forgery Attack against PAES-8
PAES-8 Universal Forgery Attack Nonce Misuse
2016/1/25
PAES is an authenticated encryption scheme designed by Ye
et al., and submitted to the CAESAR competition. The designers claim
that PAES-8, which is one of the designs of the PAES-family, provides
...
Generic Universal Forgery Attack on Iterative Hash-based MACs
HMAC NMAC hash function universal forgery
2016/1/9
In this article, we study the security of iterative hash-based MACs, such as HMAC
or NMAC, with regards to universal forgery attacks. Leveraging recent advances in the analysis
of functional graphs ...
On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack
Authenticated encryption algorithm COPA Marble
2016/1/4
COPA is a block-cipher-based authenticated encryption mode
with a provable birthday-bound security under the assumption that the
underlying block cipher is a strong pseudorandom permutation, and its...
A universal forgery of Hess’s second ID-based signature against the known-message attack
ID-based signature Elliptic curve Bilinear maps
2009/4/13
In this paper we propose a universal forgery attack of Hess’s second ID-
based signature scheme against the known-message attack.
Recently, several ID-based signature schemes based on binary maps on...