Zobrazeno 1 - 10
of 316
pro vyhledávání: '"Dawson, Ed"'
Publikováno v:
In International Journal of Critical Infrastructure Protection December 2018 23:1-10
Publikováno v:
Journal of Mathematical Cryptology, Vol 12, Iss 1, Pp 37-42 (2018)
In this article, we analyse a block cipher mode of operation for authenticated encryption known as ++AE (plus-plus-AE). We show that this mode has a fundamental flaw: the scheme does not verify the most significant bit of any block in the plaintext m
Externí odkaz:
https://doaj.org/article/645dcbe900404541b3eab77d13a69738
Publikováno v:
In Automation in Construction August 2016 68:44-51
Publikováno v:
In Computers & Security June 2013 35:37-50
Publikováno v:
Journal of Mathematical Cryptology, Vol 7, Iss 3, Pp 253-277 (2013)
This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this genera
Externí odkaz:
https://doaj.org/article/7c1656a6f93843a18ce5700fec1ccae7
Autor:
RAPHAËL CW PHAN, MASAYUKI ABE, LYNN BATTEN, JUNG HEE CHEON, DAWSON, ED, GALBRAITH, STEVEN, JIAN GUO, LUCAS HUI, KWANGJO KIM, XUEJIA LAI, DONG HOON LEE, MITSURU MATSUI, TSUTOMU MATSUMOTO, SHIHO MORIAI, PHONG NGUYEN, DINGYI PEI, DUONG HIEU PHAN, PIEPRZYK, JOSEF, HUAXIONG WANG, HANK WOLFE
Publikováno v:
Communications of the ACM; Apr2020, Vol. 63 Issue 4, p76-81, 6p, 3 Color Photographs, 1 Chart
Publikováno v:
Journal of Mathematical Cryptology, Vol 5, Iss 1, Pp 1-50 (2011)
Several forms of elliptic curves are suggested for an efficient implementation of Elliptic Curve Cryptography. However, a complete description of the group law has not appeared in the literature for most popular forms. This paper presents group law i
Externí odkaz:
https://doaj.org/article/e624ac981af4422782d0bbf8ada0ed67
Publikováno v:
In The Journal of Systems & Software 2009 82(2):270-273
Publikováno v:
In Computers and Electrical Engineering 2009 35(1):49-53