Survey on cyberspace security

H Zhang, W Han, X Lai, D Lin, J Ma, JH Li - Science China Information …, 2015 - Springer
Along with the rapid development and wide application of information technology, human
society has entered the information era. In this era, people live and work in cyberspace …

Breaking symmetric cryptosystems using quantum period finding

M Kaplan, G Leurent, A Leverrier… - Advances in Cryptology …, 2016 - Springer
Due to Shor's algorithm, quantum computers are a severe threat for public key cryptography.
This motivated the cryptographic community to search for quantum-safe solutions. On the …

A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization

D Chao, D Xu, F Gao, C Zhang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The importance of safeguarding individuals' privacy rights in online activities is unmistakable
in today's anonymity networks. Since the introduction of Mixnet by Chaum, numerous …

An IoT endpoint system-on-chip for secure and energy-efficient near-sensor analytics

F Conti, R Schilling, PD Schiavone… - … on Circuits and …, 2017 - ieeexplore.ieee.org
Near-sensor data analytics is a promising direction for internet-of-things endpoints, as it
minimizes energy spent on communication and reduces network load-but it also poses …

[PDF][PDF] 网络空间安全综述

张焕国, 韩文报, 来学嘉, 林东岱, 马建峰, 李建华 - 信息安全, 2016 - scis.scichina.com
摘要随着信息技术的发展与广泛应用, 人类社会进入信息化时代. 在信息时代,
人们生活和工作在网络空间中. 网络空间是所有信息系统的集合, 是人类生存的信息环境. 因此 …

Counter-in-tweak: authenticated encryption modes for tweakable block ciphers

T Peyrin, Y Seurin - Annual International Cryptology Conference, 2016 - Springer
Abstract We propose the Synthetic Counter-in-Tweak (SCT) mode, which turns a tweakable
block cipher into a nonce-based authenticated encryption scheme (with associated data) …

Message franking via committing authenticated encryption

P Grubbs, J Lu, T Ristenpart - … in Cryptology–CRYPTO 2017: 37th Annual …, 2017 - Springer
We initiate the study of message franking, recently introduced in Facebook's end-to-end
encrypted message system. It targets verifiable reporting of abusive messages to Facebook …

Improved key recovery attacks on reduced-round AES with practical data and memory complexities

A Bar-On, O Dunkelman, N Keller, E Ronen… - Journal of …, 2020 - Springer
Determining the security of AES is a central problem in cryptanalysis, but progress in this
area had been slow and only a handful of cryptanalytic techniques led to significant …

GCM-SIV: full nonce misuse-resistant authenticated encryption at under one cycle per byte

S Gueron, Y Lindell - Proceedings of the 22nd ACM SIGSAC Conference …, 2015 - dl.acm.org
Authenticated encryption schemes guarantee both privacy and integrity, and have become
the default level of encryption in modern protocols. One of the most popular authenticated …

{Nonce-Disrespecting} adversaries: practical forgery attacks on {GCM} in {TLS}

H Böck, A Zauner, S Devlin, J Somorovsky… - 10th USENIX Workshop …, 2016 - usenix.org
We investigate nonce reuse issues with the GCM block cipher mode as used in TLS and
focus in particular on AES-GCM, the most widely deployed variant. With an Internet-wide …