Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
Survey on cyberspace security
H Zhang, W Han, X Lai, D Lin, J Ma, JH Li - Science China Information …, 2015 - Springer
Along with the rapid development and wide application of information technology, human
society has entered the information era. In this era, people live and work in cyberspace …
society has entered the information era. In this era, people live and work in cyberspace …
Robust authenticated-encryption AEZ and the problem that it solves
With a scheme for robust authenticated-encryption a user can select an arbitrary value λ\! ≥
0 and then encrypt a plaintext of any length into a ciphertext that's λ characters longer. The …
0 and then encrypt a plaintext of any length into a ciphertext that's λ characters longer. The …
[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …
standardization process to select one or more Authenticated Encryption with Associated …
Counter-in-tweak: authenticated encryption modes for tweakable block ciphers
Abstract We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable
block cipher into a nonce-based authenticated encryption scheme (with associated data) …
block cipher into a nonce-based authenticated encryption scheme (with associated data) …
The Deoxys AEAD Family
We present the Deoxys family of authenticated encryption schemes, which consists of
Deoxys-I and Deoxys-II. Both are nonce-based authenticated encryption schemes with …
Deoxys-I and Deoxys-II. Both are nonce-based authenticated encryption schemes with …
Key rotation for authenticated encryption
A common requirement in practice is to periodically rotate the keys used to encrypt stored
data. Systems used by Amazon and Google do so using a hybrid encryption technique …
data. Systems used by Amazon and Google do so using a hybrid encryption technique …
Four attacks and a proof for Telegram
We study the use of symmetric cryptography in the MTProto 2.0 protocol, Telegram's
equivalent of the TLS record protocol. We give positive and negative results. On the one …
equivalent of the TLS record protocol. We give positive and negative results. On the one …
Cryptanalysis of OCB2: attacks on authenticity and confidentiality
A Inoue, T Iwata, K Minematsu, B Poettering - Journal of Cryptology, 2020 - Springer
We present practical attacks on OCB2. This mode of operation of a blockcipher was
designed with the aim to provide particularly efficient and provably secure authenticated …
designed with the aim to provide particularly efficient and provably secure authenticated …
Full-state keyed duplex with built-in multi-user support
The keyed duplex construction was introduced by Bertoni et al.(SAC 2011) and recently
generalized to full-state absorption by Mennink et al.(ASIACRYPT 2015). We present a …
generalized to full-state absorption by Mennink et al.(ASIACRYPT 2015). We present a …