1 resultado para security model
em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo
Filtro por publicador
- Aberdeen University (8)
- Abertay Research Collections - Abertay University’s repository (1)
- Academic Research Repository at Institute of Developing Economies (2)
- AMS Tesi di Laurea - Alm@DL - Università di Bologna (2)
- Archimer: Archive de l'Institut francais de recherche pour l'exploitation de la mer (1)
- Archive of European Integration (10)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (1)
- Aston University Research Archive (3)
- Biblioteca Digital - Universidad Icesi - Colombia (1)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (1)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (4)
- Biblioteca Digital de Teses e Dissertações Eletrônicas da UERJ (2)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (1)
- Boston University Digital Common (1)
- Brock University, Canada (1)
- Bucknell University Digital Commons - Pensilvania - USA (3)
- Bulgarian Digital Mathematics Library at IMI-BAS (5)
- Cambridge University Engineering Department Publications Database (1)
- CentAUR: Central Archive University of Reading - UK (7)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (10)
- Cochin University of Science & Technology (CUSAT), India (2)
- Coffee Science - Universidade Federal de Lavras (1)
- Comissão Econômica para a América Latina e o Caribe (CEPAL) (2)
- CORA - Cork Open Research Archive - University College Cork - Ireland (1)
- Deakin Research Online - Australia (65)
- Department of Computer Science E-Repository - King's College London, Strand, London (1)
- Digital Commons - Michigan Tech (2)
- Digital Commons @ DU | University of Denver Research (1)
- Digital Commons at Florida International University (10)
- Digital Peer Publishing (1)
- DigitalCommons@The Texas Medical Center (1)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (1)
- DRUM (Digital Repository at the University of Maryland) (4)
- Duke University (1)
- eResearch Archive - Queensland Department of Agriculture; Fisheries and Forestry (1)
- Helda - Digital Repository of University of Helsinki (2)
- Indian Institute of Science - Bangalore - Índia (7)
- Instituto Politécnico de Viseu (1)
- Instituto Superior de Psicologia Aplicada - Lisboa (1)
- Nottingham eTheses (1)
- Portal de Revistas Científicas Complutenses - Espanha (1)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (14)
- Queensland University of Technology - ePrints Archive (731)
- Repositório Científico da Universidade de Évora - Portugal (1)
- Repositório digital da Fundação Getúlio Vargas - FGV (6)
- Repositório do ISCTE - Instituto Universitário de Lisboa (1)
- Repositório Institucional da Universidade de Aveiro - Portugal (2)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (8)
- Research Open Access Repository of the University of East London. (3)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (2)
- Universidad de Alicante (2)
- Universidad del Rosario, Colombia (1)
- Universidad Politécnica de Madrid (11)
- Universidade Federal do Rio Grande do Norte (UFRN) (1)
- Universidade Técnica de Lisboa (1)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (3)
- University of Michigan (7)
- University of Queensland eSpace - Australia (2)
- WestminsterResearch - UK (1)
Resumo:
The ALRED construction is a lightweight strategy for constructing message authentication algorithms from an underlying iterated block cipher. Even though this construction's original analyses show that it is secure against some attacks, the absence of formal security proofs in a strong security model still brings uncertainty on its robustness. In this paper, aiming to give a better understanding of the security level provided by different authentication algorithms based on this design strategy, we formally analyze two ALRED variants-the MARVIN message authentication code and the LETTERSOUP authenticated-encryption scheme,-bounding their security as a function of the attacker's resources and of the underlying cipher's characteristics.