Results 11 to 20 of about 124 (57)

A construction of encryption protocols over some semidirect products

open access: yesJournal of Mathematical Cryptology, 2023
In CANDARW ’18, Isobe et al. proposed a secure encryption protocol on non-abelian groups based on the Anshel–Anshel–Goldfeld key exchange protocol. There have remained two weak points on the protocol: one is that the protocol is indistinguishable against
Isobe Shuji, Koizumi Eisuke
doaj   +1 more source

The mF mode of authenticated encryption with associated data

open access: yesJournal of Mathematical Cryptology, 2022
In recent years, the demand for lightweight cryptographic protocols has grown immensely. To fulfill this necessity, the National Institute of Standards and Technology (NIST) has initiated a standardization process for lightweight cryptographic encryption.
Chakraborty Bishwajit, Nandi Mridul
doaj   +1 more source

Accountable multi-authority attribute-based data access control in smart grids

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
The developments of AI, information security and network technology have improved the security, efficiency of the smart grid system. However real-time data and consume data sharing make privacy leakage, malicious entities and users be uncontrollable ...
Leyou Zhang   +3 more
doaj   +1 more source

Provable security against generic attacks on stream ciphers

open access: yesJournal of Mathematical Cryptology, 2023
Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power ...
Moch Alexander
doaj   +1 more source

Cryptanalysis of ITRU [PDF]

open access: yes, 2021
ITRU cryptosystem is a public key cryptosystem and one of the known variants of NTRU cryptosystem. Instead of working in a truncated polynomial ring, ITRU cryptosystem is based on the ring of integers.
Hashim, Hayder R.   +2 more
core   +3 more sources

New approach to practical leakage-resilient public-key cryptography

open access: yesJournal of Mathematical Cryptology, 2020
We present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols.
Chakraborty Suvradip   +2 more
doaj   +1 more source

Towards a Ring Analogue of the Leftover Hash Lemma

open access: yesJournal of Mathematical Cryptology, 2020
The leftover hash lemma (LHL) is used in the analysis of various lattice-based cryptosystems, such as the Regev and Dual-Regev encryption schemes as well as their leakage-resilient counterparts. The LHL does not hold in the ring setting, when the ring is
Dachman-Soled Dana   +3 more
doaj   +1 more source

MALWARE ANALYSIS AND STATIC CALL GRAPH GENERATION WITH RADARE2 [PDF]

open access: yes, 2023
A powerful feature used in automated malware analysis is the static call graph of the executable file. Elimination of sandbox environment, fast scan, function call patterns beyond instruction level information – all of these motivate the prevalence of ...
MESTER, Attila
core   +2 more sources

Group key management based on semigroup actions [PDF]

open access: yes, 2016
In this work we provide a suite of protocols for group key management based on general semigroup actions. Construction of the key is made in a distributed and collaborative way.
Lopez-Ramos, Juan Antonio   +3 more
core   +1 more source

Hypothesis testing and advanced distinguishers in differential cryptanalysis of block ciphers [PDF]

open access: yes, 2015
Distinguishing distributions is a major part during cryptanalysis of symmetric block ciphers. The goal of the cryptanalyst is to distinguish two distributions; one that characterizes the number of certain events which occur totally at random and another ...
Courtois, N, Mourouzis, T
core   +1 more source

Home - About - Disclaimer - Privacy