搜索结果: 1-15 共查到“知识库 operation”相关记录234条 . 查询时间(0.259 秒)
SPAE a mode of operation for AES on low-cost hardware
secret-key cryptography AES block ciphers
2019/9/16
We propose SPAE, a single pass, patent free, authenticated encryption with associated data (AEAD) for AES. The algorithm has been developped to address the needs of a growing trend in IoT systems: sto...
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation
Lightweight cryptography authenticated encryption with associated data blockciphe
2019/6/14
Lightweight cryptography in computationally constrained devices is actively studied. In contrast to advances of lightweight blockcipher in the last decade, lightweight mode of operation is seemingly n...
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
Authenticated encryption beyond-birthday-bound security tweakable block- cipher
2019/4/3
Using a small block length is a common strategy in designing lightweight block cipher. So far, many 64-bit primitives have been proposed. However, if we use such a 64-bit primitive for an authenticate...
An optimized multi agent-based modeling of smart rescue operation
Multi-agent based modeling Resource allocation Multiplicatively Weighted Network Voronoi Diagram Particle Swarm Optimization Smart rescue operation Smart city
2018/4/18
After the incidence of a disaster, a high demand for first-aid and a huge number of injured will emerge at the affected areas. In this paper, the optimum allocation of the medical assistance to the in...
An optimized multi agent-based modeling of smart rescue operation
Multi-agent based modeling Resource allocation Multiplicatively Weighted Network Voronoi Diagram Particle Swarm Optimization Smart rescue operation Smart city
2018/5/8
After the incidence of a disaster, a high demand for first-aid and a huge number of injured will emerge at the affected areas. In this paper, the optimum allocation of the medical assistance to the in...
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation
modes of operation key derivation nonce-misuse resistance
2017/7/24
Block cipher modes of operation provide a way to securely encrypt using a block cipher. The main factors in analyzing modes of operation are the level of security achieved (chosen-plaintext security, ...
Modes of Operation Suitable for Computing on Encrypted Data
secret-key cryptography OTR mode
2017/6/2
We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multi-party computation engine. These two modes are selected because...
BLAKE2 is a hash function introduced at ACNS 2013, which has been adopted in many constructions and applications. It is a successor to the SHA-3 finalist BLAKE, which received a significant amount of ...
HYPERSPECTRAL IMAGE KERNEL SPARSE SUBSPACE CLUSTERING WITH SPATIAL MAX POOLING OPERATION
Hyperspectral image nonlinear processing spatial max pooling SSC kernel
2016/7/28
In this paper, we present a kernel sparse subspace clustering with spatial max pooling operation (KSSC-SMP) algorithm for hyperspectral remote sensing imagery. Firstly, the feature points are mapped f...
Monitoring of operation loading of three-point linkage during ploughing
tractor plough soil properties
2016/4/5
The research was focused on operational measurements of tractor plough tools and their subsequent utilisation and
simulation under laboratory conditions by a hydrostatic simulator. In this field, th...
THE DISPLAY OF CHINESE AND ENGLISH CHARACTERS BASED ON OPENGL ES IN SYMBIAN OPERATION SYSTEM
Symbian OS OpenGL ES Unicode Chinese display FreeType 3D
2016/3/17
This article is about the method of the display of Chinese and English Characaters in the programming environment of Carbide.c++.Development of this method is based on Symbian Series 60 platform and O...
Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation
Post-quantum cryptography Block ciphers Modes of operation
2016/2/25
We examine the IND-qCPA security of the wide-spread block cipher modes of operation
CBC, CFB, OFB, CTR, and XTS (i.e., security against quantum adversaries doing queries
in superposition). We show t...
New bit-parallel Montgomery multiplier for trinomials using squaring operation
Montgomery multiplication squaring bit-parallel
2016/1/23
In this paper, a new bit-parallel Montgomery multiplier for GF(2m) is presented, where the field is generated with an irreducible trinomial. We first present a slightly generalized version of a newly...
Automated Analysis and Synthesis of Block-Cipher Modes of Operation
modes of operation synthesis
2016/1/7
Block ciphers such as AES are deterministic, keyed functions that operate on small, fixed-size blocks.
Block-cipher modes of operation define a mechanism for probabilistic encryption of arbitrary len...
Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes
Pseudorandom functions Even-Mansour Constructions Lower Bound Proofs in the Random Oracle Model
2015/12/29
In the last years, much research work has been invested into the security analysis of key alternating ciphers in the random oracle model. These are pseudorandom permutations (PRPs), sometimes also cal...