搜索结果: 1-15 共查到“军事学 Encryption Algorithm”相关记录15条 . 查询时间(0.015 秒)
Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication
Enigma Machine authenticated encryption polyalphabetic cipher
2019/5/21
Enigma 2000 (E2K) is a cipher that updates the World War II-era Enigma Machine for the twenty-first century. Like the original Enigma, E2K is intended to be computed by an offline device; this prevent...
ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication
low-tech ciphers authenticated encryption
2017/4/24
ElsieFour (LC4) is a low-tech cipher that can be computed by hand; but unlike many historical ciphers, LC4 is designed to be hard to break. LC4 is intended for encrypted communication between humans o...
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm
Authenticated encryption CAESAR ELmD
2016/6/22
In this paper, we provide a security analysis of ELmD: a block cipher based Encrypt-Linear-mix-Decrypt authentication mode. As being one of the second-round CAESAR candidate, it is claimed to provide ...
In this article, a new symmetric block cipher named MSEA is proposed. MSEA is based on ARX cryptographic design technique. MSEA is simple in nature due to the use of combinations of elementary oper...
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE
authenticated encryption forgery attack ALE
2016/1/4
ALE is a new authenticated encryption algorithm published at FSE 2013. The
authentication component of ALE is based on the strong Pelican MAC, and the authentication
security of ALE is claimed to be...
Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE
authenticated encryption forgery attack ALE
2016/1/4
ALE is a new authenticated encryption algorithm published at FSE 2013. The
authentication component of ALE is based on the strong Pelican MAC, and the authentication
security of ALE is claimed to be...
Cryptanalysis of the Authenticated Encryption Algorithm COFFE
COFFE Authenticated cipher Forgery Attack
2015/12/24
COFFE is a hash-based authenticated encryption scheme. In the original paper,
it was claimed to have IND-CPA security and also ciphertext integrity even in nonce-misuse
scenario. In this paper, we a...
This paper introduces a dedicated authenticated encryption algorithm AEGIS; AEGIS allows for the protection of associated data which makes it very suitable for protecting network packets. AEGIS-128L u...
This document describes the symmetric encryption algorithm called Puzzle. It is free and open. The objective of this paper is to get an opinion about its security from the cryptology community. It is ...
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird cipher constrained devices lightweight cryptography ISO 18000-6C
2012/3/29
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message processed. Like it's pre...
A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods
Chaos-based cryptosystem NIST perturbed technique
2010/2/1
This paper presents a novel chaos-based cryptosystem for secure transmitted images. In the proposed block encryption/decryption algorithm, two chaotic permutation methods (key-dependant shift approach...
Cryptanalysis of the Improved Cellular Message Encryption Algorithm
cryptanalysis block cipher chosen-plaintext attack
2009/6/9
This paper analyzes the Improved Cellular Message Encryp-
tion Algorithm (CMEA-I) which is an improved version of the Telecom-
munication Industry Association's Cellular Message Encryption Algo-
ri...
SMS4 Encryption Algorithm for Wireless Networks
SMS4 Encryption Algorithm Wireless Networks
2009/6/5
SMS4 is a Chinese block cipher standard, mandated for use in protecting wireless net-
works, and issued in January 2006. The input, output, and key of SMS4 are each 128 bits.
The algorithm has 32 ro...
An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure
Encryption Algorithm Key-stream Generator Chinese Text Messages Character Internal Code Structure
2009/4/17
An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure.
Known-Plaintext Attack Against a Permutation Based Video Encryption Algorithm
Known-Plaintext Attack Permutation Video Encryption Algorithm
2009/3/20
One of the approaches to deliver real-time video encryption is to apply permutations to the
bytes within a frame of a fully encoded MPEG stream as presented in [2]. We demonstrate that
this particul...