Results 171 to 180 of about 94,493 (210)
Some of the next articles are maybe not open access.
Beyond Birthday Bound Secure MAC in Faulty Nonce Model
IACR Cryptology ePrint Archive, 2019Encrypt-then-MAC (EtM) is a popular mode for authenticated encryption (AE). Unfortunately, almost all designs following the EtM paradigm, including the AE suites for TLS, are vulnerable against nonce misuse. A single repetition of the nonce value reveals the hash key, leading to a universal forgery attack.
Avijit Dutta +2 more
openaire +2 more sources
SCIENTIA SINICA Informationis
In recent years, beyond-birthday-bound (BBB) secure cryptographic primitives have attracted much attention. As an extension of the traditional cryptographic primitive, tweakable cryptographic primitive also plays an important role in cryptographic ...
Ping ZHANG, Yiyuan LUO
openaire +2 more sources
In recent years, beyond-birthday-bound (BBB) secure cryptographic primitives have attracted much attention. As an extension of the traditional cryptographic primitive, tweakable cryptographic primitive also plays an important role in cryptographic ...
Ping ZHANG, Yiyuan LUO
openaire +2 more sources
One-Key Compression Function Based MAC with Security Beyond Birthday Bound
Australasian Conference on Information Security and Privacy, 2016Gaži et al. [CRYPTO 2014] analyzed the NI-MAC construction proposed by An and Bellare [CRYPTO 1999] and gave a tight birthday-bound of $$O\ell q^{2}/2^{n}$$, as an improvement over the previous bound of $$O\ell ^{2}q^{2}/2^{n}$$. In this paper, we design a simple extension of NI-MAC, called $$\mathrm{NI}^{+}$$-MAC, and prove that it has security bound ...
Avijit Dutta, Mridul Nandi, Goutam Paul
openaire +2 more sources
XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation
IACR Cryptology ePrint Archive, 2023Zhenzhen Bao +5 more
openaire +2 more sources
Dedicated Quantum Attacks on XOR-Type Function With Applications to Beyond-Birthday- Bound MACs
IEEE Transactions on Information Forensics and SecurityA lot of work in the field of quantum cryptanalysis is currently devoted to finding applications of Grover-meets-Simon algorithm and its complexity is given in the form of $\mathcal {O}$ , but research on how to implement the attack efficiently is still
Tairong Shi +6 more
semanticscholar +1 more source
Efficient beyond-birthday-bound secure authenticated encryption modes
Science China Information Sciences, 2018Ping Zhang, Honggang Hu, Peng Wang
openaire +1 more source
Climate change impacts on plant pathogens, food security and paths forward
Nature Reviews Microbiology, 2023Brajesh K Singh +2 more
exaly
The rumen microbiome: balancing food security and environmental impacts
Nature Reviews Microbiology, 2021Itzhak Mizrahi, Robert Wallace
exaly
Journal of Computer Virology and Hacking Techniques, 2023
Alexey Kurochkin, D. Fomin
semanticscholar +1 more source
Alexey Kurochkin, D. Fomin
semanticscholar +1 more source
Beyond-birthday security for permutation-based Feistel networks
Designs, Codes and Cryptography, 2021Chun Guo, Guoyan Zhang
semanticscholar +1 more source

