搜索结果: 1-5 共查到“军事学 Design Principles”相关记录5条 . 查询时间(0.056 秒)
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications
cryptographic protocols Design Principles
2017/3/13
We develop foundations and several constructions for security protocols that can automatically detect, without false positives, if a secret (such as a key or password) has been misused. Such construct...
Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis
side-channel analysis fresh rekeying
2014/3/12
Leakage-resilient cryptography aims at developing new algorithms for which physical security against side-channel attacks can be formally analyzed. Following the work of Dziembowski and Pietrzak at FO...
This paper deals with the security of iterated hash functions
against generic attacks, such as, e.g., Joux' multicollision attacks from
Crypto 04 [6]. The core idea is to increase the size of the in...
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
Hash function Random oracle Ideal cipher model
2008/6/30
In this paper, we introduce new compression function design
principles supporting variable output lengths (multiples of size n). They
are based on a function or block cipher with an n-bit output siz...
Hash Function Design Principles Supporting Variable Output Lengths from One Small Function
Hash function Random oracle Ideal cipher model
2008/5/22
In this paper, we introduce new hash function design princi-
ples with variable output lengths (multiple of n). It is based on a function
or a block cipher which has output size n. In the random ora...