New forgery attack on the authenticated cipher SCREAM and iSCREAM

Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. Recently, authentica-tion encryption algorithms have received attentions extensively since the event of...

全面介绍

书目详细资料
Main Authors: Yu-dan TIAN, Yong-zhuang WEI
格式: 文件
语言:English
出版: POSTS&TELECOM PRESS Co., LTD 2016-01-01
丛编:网络与信息安全学报
主题:
在线阅读:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00012