1. Trang chủ
  2. » Luận Văn - Báo Cáo

Nghiên cứu hai hệ mật mã hạng nhẹ giành chiến thắng trong cuộc thi CAESAR

86 5 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 86
Dung lượng 2,82 MB

Nội dung

Ngày đăng: 20/07/2021, 09:30

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
[2] "Lightweight Cryptography Program of NIST," [Online]. Available: https://csrc.nist.gov/projects/lightweight-cryptography Sách, tạp chí
Tiêu đề: Lightweight Cryptography Program of NIST
[4] M. Bellare and C. Namprempre, "Authenticated encryption: Relations among notions andanalysis of the generic composition paradigm," in International Conference on the Theory and Application of Cryptology and Information Security, Springer, 2000, p. 531–545 Sách, tạp chí
Tiêu đề: Authenticated encryption: Relations among notions andanalysis of the generic composition paradigm
[5] C. S. Jutla, "Encryption modes with almost free message integrity," in International Conference on the Theory and Applications of Cryptographic Techniques, 2001, Springer, p. 529–544 Sách, tạp chí
Tiêu đề: Encryption modes with almost free message integrity
[6] P. Rogaway, M. Bellare, and J. Black. Ocb, "A block-cipher mode of operation for efficient authenticated encryption," in ACM Transactions on Information and System Security (TISSEC), 2003, p. 365–403 Sách, tạp chí
Tiêu đề: A block-cipher mode of operation for efficient authenticated encryption
[7] G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, "Permutation-based encryption, authentication and authenticated encryption," Directions in Authenticated Ciphers, 2012 Sách, tạp chí
Tiêu đề: Permutation-based encryption, authentication and authenticated encryption
[8] M. ˚Agren, M. Hell, T. Johansson, and W. Meier, "Grain-128a: a new version of grain-128 with optional authentication," in International Journal of Wireless and Mobile Computing, 2011, p. 48–59 Sách, tạp chí
Tiêu đề: Grain-128a: a new version of grain-128 with optional authentication
[9] Denning, Dorothy E.; Sacco, Giovanni Maria , "Timestamps in key distribution protocols," Communications of the ACM Sách, tạp chí
Tiêu đề: Timestamps in key distribution protocols
[10] B. PRENEEL, "Cryptographic Primitives for Information Authentication — State of the Art," in State of the Art in Applied Cryptography, Springer-Verlag, 1998, pp. 49- 104 Sách, tạp chí
Tiêu đề: Cryptographic Primitives for Information Authentication — State of the Art
[12] Tom Yu, Sam Hartman, Kenneth Raeburn , The Perils of Unauthenticated Encryption: Kerberos Version 4 ∗ Sách, tạp chí
Tiêu đề: The Perils of Unauthenticated Encryption: Kerberos Version 4
[14] D. McGrew and J. Viega, "The galois/counter mode of operation (gcm)," NIST Modes Operation Symmetric Key Block Ciphers Sách, tạp chí
Tiêu đề: The galois/counter mode of operation (gcm)
[15] D. A. McGrew and J. Viega, "The security and performance of the galois/counter mode (gcm) of operation," in International Conference on Cryptology in India, Springer, 2004, p. 343–355 Sách, tạp chí
Tiêu đề: The security and performance of the galois/counter mode (gcm) of operation
[16] Markku-Juhani O. Saarinen, "Cycling attacks on gcm, ghash and other polynomial macs and hashes," in Fast Software Encryption, Springer, 2012, p. 216–225 Sách, tạp chí
Tiêu đề: Cycling attacks on gcm, ghash and other polynomial macs and hashes
[17] D. J. Bernstein, Caesar call for submissions, January 27, 2014 Sách, tạp chí
Tiêu đề: Caesar call for submissions
[18] F. Abed, C. Forler, and S. Lucks, "General classification of the authenticated encryption schemes for the caesar competition," in Computer Science Review, 2016, p. 13–26 Sách, tạp chí
Tiêu đề: General classification of the authenticated encryption schemes for the caesar competition
[19] Wu, Hongjun, ACORN: A Lightweight Authenticated Cipher (v3)., 2016 Sách, tạp chí
Tiêu đề: ACORN: A Lightweight Authenticated Cipher (v3)
[20] Md Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie, Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN, Singapore , 2016 Sách, tạp chí
Tiêu đề: Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
[21] T. Johansson and F. Jonsson, Advances in Cryptology — EUROCRYPT ’99. s.l., Springer-Verlag, 1999 Sách, tạp chí
Tiêu đề: Advances in Cryptology — EUROCRYPT ’99. s.l
[22] Siegenthaler, T., "Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications," IEEE Transactions on Information Theory, 1984 Sách, tạp chí
Tiêu đề: Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications
[23] V.V. Chepyzhov, T. Johansson and B. Smeets, Fast Software Encryption, 2000 Sách, tạp chí
Tiêu đề: Fast Software Encryption
[24] Willi MeierOthmar Staffelbach, "Fast Correlation Attacks on Certain Stream Ciphers," Journal of Cryptography, 1989 Sách, tạp chí
Tiêu đề: Fast Correlation Attacks on Certain Stream Ciphers
w