搜索结果: 1-5 共查到“军队指挥学 KETJE”相关记录5条 . 查询时间(0.046 秒)
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak
Conditional Cube Attack Keccak Ketje Jr
2019/5/9
Conditional cube attack was proposed by Huang et al. at EUROCRYPT 2017 to attack Keccak keyed mode. Inspired by dynamic cube attack, they reduce the degree by appending key bit conditions on the initi...
Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness
Authenticated Encryption KETJE SHA-3
2018/11/19
Recently the CAESAR competition has announced several finalists among the submitted authenticated encryption algorithms, after an open selection process during the last 5 years. Applications using the...
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Fault Attack Statistical Ineffective Fault Attack SIFA
2018/11/15
In the context of fault attacks on nonce-based authenticated encryption, an attacker faces two restrictions. The first is the uniqueness of the nonce for each new encryption that prevents the attacker...
Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol
Privacy-preserving authentication protocol Physically Unclonable Function Authenticated Encryption
2018/11/2
In this paper, we focus on the design of a novel authentication protocol that preserves the privacy of embedded devices. A Physically Unclonable Function (PUF) generates challenge-response pairs that ...
This paper studies the Keccak-based authenticated encryption (AE) scheme Ketje Sr against cube-like attacks. Ketje is one of the remaining 16 candidates of third round CAESAR competition, whose primar...