Results 171 to 180 of about 94,493 (210)
Some of the next articles are maybe not open access.

Beyond Birthday Bound Secure MAC in Faulty Nonce Model

IACR Cryptology ePrint Archive, 2019
Encrypt-then-MAC (EtM) is a popular mode for authenticated encryption (AE). Unfortunately, almost all designs following the EtM paradigm, including the AE suites for TLS, are vulnerable against nonce misuse. A single repetition of the nonce value reveals the hash key, leading to a universal forgery attack.
Avijit Dutta   +2 more
openaire   +2 more sources

Beyond-birthday-bound (BBB) secure tweakable cryptographic primitives based on tweakable Even-Mansour cipher instances

SCIENTIA SINICA Informationis
In recent years, beyond-birthday-bound (BBB) secure cryptographic primitives have attracted much attention. As an extension of the traditional cryptographic primitive, tweakable cryptographic primitive also plays an important role in cryptographic ...
Ping ZHANG, Yiyuan LUO
openaire   +2 more sources

One-Key Compression Function Based MAC with Security Beyond Birthday Bound

Australasian Conference on Information Security and Privacy, 2016
Gaži et al. [CRYPTO 2014] analyzed the NI-MAC construction proposed by An and Bellare [CRYPTO 1999] and gave a tight birthday-bound of $$O\ell q^{2}/2^{n}$$, as an improvement over the previous bound of $$O\ell ^{2}q^{2}/2^{n}$$. In this paper, we design a simple extension of NI-MAC, called $$\mathrm{NI}^{+}$$-MAC, and prove that it has security bound ...
Avijit Dutta, Mridul Nandi, Goutam Paul
openaire   +2 more sources

XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation

IACR Cryptology ePrint Archive, 2023
Zhenzhen Bao   +5 more
openaire   +2 more sources

Dedicated Quantum Attacks on XOR-Type Function With Applications to Beyond-Birthday- Bound MACs

IEEE Transactions on Information Forensics and Security
A lot of work in the field of quantum cryptanalysis is currently devoted to finding applications of Grover-meets-Simon algorithm and its complexity is given in the form of $\mathcal {O}$ , but research on how to implement the attack efficiently is still
Tairong Shi   +6 more
semanticscholar   +1 more source

Efficient beyond-birthday-bound secure authenticated encryption modes

Science China Information Sciences, 2018
Ping Zhang, Honggang Hu, Peng Wang
openaire   +1 more source

Climate change impacts on plant pathogens, food security and paths forward

Nature Reviews Microbiology, 2023
Brajesh K Singh   +2 more
exaly  

The rumen microbiome: balancing food security and environmental impacts

Nature Reviews Microbiology, 2021
Itzhak Mizrahi, Robert Wallace
exaly  

MGM beyond the birthday bound

Journal of Computer Virology and Hacking Techniques, 2023
Alexey Kurochkin, D. Fomin
semanticscholar   +1 more source

Beyond-birthday security for permutation-based Feistel networks

Designs, Codes and Cryptography, 2021
Chun Guo, Guoyan Zhang
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy