搜索结果: 1-6 共查到“军事学 Associated”相关记录6条 . 查询时间(0.265 秒)
Boosting OMD for Almost Free Authentication of Associated Data
Authenticated encryption OMD associated data
2015/12/31
We propose pure OMD (p-OMD) as a new variant of the Offset Merkle-Damgård (OMD) authenticated
encryption scheme. Our new scheme inherits all desirable security features of OMD while having
a m...
Trapdoor oneway functions associated with exponentiation
secret-key cryptography / Exponential function elliptic curves division polynomials
2012/3/29
This paper shows that if exponentiation $b=X^{k}$ in groups of finite field units or $B=[k]X$ in elliptic curves is considered as encryption of $X$ with exponent $k$ treated as symmetric key, then the...
A non-Abelian factorization problem and an associated cryptosystem
public-key cryptography / Non-abelian Groups Braid Groups GL$_n({{\mathbb{F}}_q})$ UT$_n({{\mathbb{F}}_q})$
2012/3/29
In this note, we define a cryptosystem based on non-commutative properties of groups. The cryptosystem is based on the hardness of the problem of factoring over these groups. This problem, interesting...
A non-Abelian factorization problem and an associated cryptosystem
Cryptography Discrete logarithm problem Die-Hellman key exchange
2011/2/23
In this note, we define a cryptosystem based on non-commutative properties of groups. The cryptosystem is based on the hardness of the problem of factoring over these groups. This problem, interesting...
A Simple and Generic Construction of Authenticated Encryption With Associated Data
authenticated encryption with associated data collision resistant hash function generic construction
2009/6/12
We revisit the problem of constructing a protocol for performing authenticated encryption
with associated data (AEAD). A technique is described which combines a collision resistant hash function
wit...
EME:extending EME to handle arbitrary-length messages with associated data
EME extending EME arbitrary-length messages
2009/3/27
This work describes a mode of operation, EME, that turns a regular block cipher into a
length-preserving enciphering scheme for messages of (almost) arbitrary length. Specifically, the resulting sche...