Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
FAST: disk encryption and beyond
This work introduces\sym {FAST} which is a new family of tweakable enciphering schemes.
Several instantiations of\sym {FAST} are described. These are targeted towards two goals …
Several instantiations of\sym {FAST} are described. These are targeted towards two goals …
Encryption schemes secure under related-key and key-dependent message attacks
We construct secret-key encryption (SKE) schemes that are secure against related-key
attacks and in the presence of key-dependent messages (RKA-KDM secure). We emphasize …
attacks and in the presence of key-dependent messages (RKA-KDM secure). We emphasize …
[HTML][HTML] Random multiple key streams for encryption with added CBC mode of operation
P Penchalaiah, KR Reddy - Perspectives in Science, 2016 - Elsevier
There are many cryptographic systems that use complex operations involving substitutions
and permutations to produce resistant ciphertext, even if the level of the security of these …
and permutations to produce resistant ciphertext, even if the level of the security of these …
KDM security in the hybrid framework
We study the natural question of how well suited the hybrid encryption paradigm is in the
context of key-dependent message (KDM) attacks. We prove that if a key derivation function …
context of key-dependent message (KDM) attacks. We prove that if a key derivation function …
Practical collision attack on 40-step RIPEMD-128
G Wang - Topics in Cryptology–CT-RSA 2014: The …, 2014 - Springer
Abstract RIPEMD-128 is an ISO/IEC standard cryptographic hash function proposed in 1996
by Dobbertin, Bosselaers and Preneel. The compression function of RIPEMD-128 consists …
by Dobbertin, Bosselaers and Preneel. The compression function of RIPEMD-128 consists …
[PDF][PDF] Secure and cost effective cryptosystem design based on random multiple key streams
P Padugupati, KR Reddy - J. Inf. Secur. Res, 2016 - dline.info
There are many cryptographic systems that use complex operations involving substitutions
and permutations to produce resistant ciphertext, even if the level of the security of these …
and permutations to produce resistant ciphertext, even if the level of the security of these …
[PDF][PDF] Studies on Disk Encryption
CM López - 2013 - cimat.mx
The problem of disk encryption is to encrypt bulk information stored in a storage media like
hard disk, flash memory, CD or DVD. The nature of storage media dictates the type of …
hard disk, flash memory, CD or DVD. The nature of storage media dictates the type of …
RKA-KDM secure encryption from public-key encryption
We construct secret-key encryption (SKE) schemes that are secure against related-key
attacks and in the presence of key-dependent messages (RKA-KDM secure). We emphasize …
attacks and in the presence of key-dependent messages (RKA-KDM secure). We emphasize …
Constructions and Analyses of Efficient Symmetric-Key Primitives for Authentication and Encryption
S Ghosh - 2021 - search.proquest.com
In symmetric key cryptography there are two fundamental objectives, viz. 1. confidentiality or
secrecy of message from unexpected party and 2. authentication of message which includes …
secrecy of message from unexpected party and 2. authentication of message which includes …
Try again. Fail again. Fail better: new notions of security, broken assumptions, and increased efficiency in cryptography
A Connolly - 2019 - theses.hal.science
This thesis presents new results addressing three fundamental areas of cryptography:
security notions, assumptions, and efficiency. The first part encompasses the security of …
security notions, assumptions, and efficiency. The first part encompasses the security of …