New forgery attack on the authenticated cipher SCREAM and iSCREAM
Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. Recently, authentica-tion encryption algorithms have received attentions extensively since the event of...
Saved in:
Main Authors: | Yu-dan TIAN, Yong-zhuang WEI |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2016-01-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00012 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
New cryptanalysis of the authenticated cipher model JAMBU
by: Yu-dan TIAN, et al.
Published: (2017-07-01) -
Le silence et le cri : Salomé, d’Oscar Wilde à Richard Strauss
by: Pascal Aquien
Published: (2013-06-01) -
Copy-Move Forgery Verification in Images Using Local Feature Extractors and Optimized Classifiers
by: S. B. G. Tilak Babu, et al.
Published: (2023-09-01) -
David A. Scott, Authenticity, Restoration, Forgery
by: Muriel Verbeeck-Boutin
Published: (2018-05-01) -
BENEATH THE CHURCH EPITAPH “TO THE GLORY OF GOD” SCREAM THE VOICES OF THE UNEMPLOYED
by: K.T. Resane
Published: (2019-07-01)