搜索结果: 1-7 共查到“军事学 Cascade”相关记录7条 . 查询时间(0.39 秒)
This work revisits the following question: in the ideal cipher model, can a cascade of several ideal (κ,n)(κ,n)-blockciphers realize 22κ22κ independent nn-bit random permutations, i.e. an ideal (2κ,n)...
On Decomposition of an NFSR into a Cascade Connection of Two Smaller
stream ciphers nonlinear feedback shift registers
2016/1/8
Nonlinear feedback shift registers (NFSRs) are an important type of sequence
generators used for building stream ciphers. The shift register used in Grain, one
of eSTREAM finalists, is a cascade con...
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption
Block ciphers Pseudorandomness
2016/1/3
This paper discusses provable security of two types of cascade encryptions. The first construction \CEl, called l-cascade encryption, is obtained by sequentially composing l blockcipher calls with ind...
The Iterated Random Permutation Problem with Applications to Cascade Encryption
iterated random permutation problem block cipherlpseudorandom permutation
2015/12/30
We introduce and study the iterated random permutation
problem, which asks how hard it is to distinguish, in a black-box way, the rth
power of a random permutation from a uniformly random permutatio...
Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade
Algebraic Pseudorandom Functions Improved Efficiency the Augmented Cascade
2010/8/23
We construct an algebraic pseudorandom function (PRF) that is more efficient than the classic Naor- Reingold algebraic PRF. Our PRF is the result of adapting the cascade construction, which is the bas...
The security of cascade blockcipher encryption is an important
and well-studied problem in theoretical cryptography with practical
implications. It is well-known that double encryption improves the ...
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption
Broadcast encryption Revocation One-way key chain
2009/2/7
We develop a couple of new methods to reduce transmission overheads
in broadcast encryption. The methods are based on the idea of assigning one key
per each partition using one-way key chains after ...