中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 信息安全国家重点实验室  > 会议论文
Title:
polye+ctr: a swiss-army-knife mode for block ciphers
Author: Zhang Liting ; Wu Wenling ; Wang Peng
Source: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Conference Name: 5th International Conference on Provable Security, ProvSec 2011
Conference Date: 16-Oct
Issued Date: 2011
Conference Place: Xi'an, China
Keyword: Authentication ; Lyapunov methods
Publish Place: Germany
Indexed Type: EI
ISSN: 3029743
ISBN: 9783642243158
Department: (1) State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China; (2) Graduate University of Chinese Academy of Sciences, Beijing 100049, China
Sponsorship: The National Natural Science Foundation of China (NSFC); Xidian Univ., Key Lab. Comput. Networks; Inf. Secur., Minist. Educ.
English Abstract: In this paper, we propose a new kind of mode of operation for block ciphers. By a single key, such a mode can protect data for privacy, authenticity and they both respectively, so we call it Swiss-Army-Knife mode. The purpose of SAK mode is to increase diversity of security services for a single key, thus we can provide different protections for data with different security requirements, without rekeying the underlying block cipher. As an example, we propose PolyE+CTR, an SAK mode that combines an authentication mode PolyE and a nonce-based encryption mode CTR in the authentication-and-encryption method. PolyE+CTR is provably secure with high efficiency. © 2011 Springer-Verlag.
Content Type: 会议论文
URI: http://ir.iscas.ac.cn/handle/311060/14249
Appears in Collections:信息安全国家重点实验室_会议论文

Files in This Item:
File Name/ File Size Content Type Version Access License
polye+ctr a swiss-army-knife mode for block ciphers.pdf(248KB)----限制开放-- 联系获取全文

Recommended Citation:
Zhang Liting,Wu Wenling,Wang Peng. polye+ctr: a swiss-army-knife mode for block ciphers[C]. 见:5th International Conference on Provable Security, ProvSec 2011. Xi'an, China. 16-Oct.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Zhang Liting]'s Articles
[Wu Wenling]'s Articles
[Wang Peng]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Zhang Liting]‘s Articles
[Wu Wenling]‘s Articles
[Wang Peng]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace