Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, pp. 85-104, 2014.
EI
Abstract:
The Sponge function is known to achieve 2(c/2) security, where c is its capacity. This bound was carried over to keyed variants of the function, such as SpongeWrap, to achieve a min{2(c/2), 2(kappa)} security bound, with. the key length. Similarly, many CAESAR competition submissions are designed to comply with the classical 2(c/2) securi...More
Code:
Data:
Upload PDF
1.Your uploaded documents will be check within 24h, and coins will be credited to your account.
2.As the current system does not support cash withdrawal, you can add staff WeChat (AMxiaomai) to receive it as a red packet.
3.10 coins will be exchanged for 1 yuan.
?
¥
Upload a single paper
for 5 coins
Wechat's Red Packet
?
¥
Upload 50 articles
for 280 coins
Wechat's Red Packet
?
¥
Upload 200 articles
for 1200 coins
Wechat's Red Packet
?
¥
Upload 500 articles
for 3000 coins
Wechat's Red Packet
?
¥
Upload 1000 articles
for 7000 coins
Wechat's Red Packet
Tags
Comments