Results 41 to 50 of about 856 (103)

The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes

open access: yesJournal of Mathematical Cryptology, 2021
Permutation-based modes have been established for lightweight authenticated encryption, as can be seen from the high interest in the ongoing NIST lightweight competition.
Bhattacharjee Arghya   +3 more
doaj   +1 more source

Generalization of Roos bias in RC4 and some results on key-keystream relations

open access: yesJournal of Mathematical Cryptology, 2018
RC4 has attracted many cryptologists due to its simple structure. In [9], Paterson, Poettering and Schuldt reported the results of a large scale computation of RC4 biases.
Dey Sabyasachi, Sarkar Santanu
doaj   +1 more source

Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves [PDF]

open access: yes, 2007
In this paper we obtain conditions on the divisors of the group order of the Jacobian of a hyperelliptic genus 2 curve, generated by the complex multiplication method described by Weng (2003) and Gaudry (2005). Examples, where these conditions imply that
Ravnshoj, Christian Robenhagen
core   +3 more sources

Persistent asymmetric password-based key exchange

open access: yesJournal of Mathematical Cryptology, 2014
Asymmetric password based key exchange is a key exchange protocol where a client and a server share a low entropic password while the server additionally owns a high entropic secret with respect to a public key. There are simple solutions for this, e.g.,
Jiang Shaoquan
doaj   +1 more source

Investigation of metabelian platform groups for protocols based on (simultaneous) conjugacy search problem

open access: yesJournal of Mathematical Cryptology
There are many group-based cryptosystems in which the security is related to the conjugacy search problem or the simultaneous conjugacy search problem in their underlying platform groups.
Kahrobaei Delaram   +4 more
doaj   +1 more source

Cryptanalysis of some protocols using matrices over group rings

open access: yes, 2015
We address a cryptanalysis of two protocols based on the supposed difficulty of discrete logarithm problem on (semi) groups of matrices over a group ring.
Eftekhari, Mohammad
core  

Dynamic-FROST: Schnorr threshold signatures with a flexible committee

open access: yesJournal of Mathematical Cryptology
Threshold signatures enable any subgroup of predefined cardinality tt out of a committee of nn participants to generate a valid, aggregated signature.
Cimatti Annalisa   +7 more
doaj   +1 more source

Revisiting structure graphs: Applications to CBC-MAC and EMAC

open access: yesJournal of Mathematical Cryptology, 2016
In [2], Bellare, Pietrzak and Rogaway proved an O⁢(ℓ⁢q2/2n)${O(\ell q^{2}/2^{n})}$ bound for the PRF (pseudorandom function) security of the CBC-MAC based on an n-bit random permutation Π, provided ...
Jha Ashwin, Nandi Mridul
doaj   +1 more source

On the quantum security of high-dimensional RSA protocol

open access: yesJournal of Mathematical Cryptology
The idea of extending the classical RSA protocol using algebraic number fields was introduced by Takagi and Naito (Construction of RSA cryptosystem over the algebraic field using ideal theory and investigation of its security.
Rahmani Nour-eddine   +3 more
doaj   +1 more source

A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack

open access: yesJournal of Mathematical Cryptology, 2019
Over the past decade, the hybrid lattice-reduction and meet-in-the middle attack (called hybrid attack) has been used to evaluate the security of many lattice-based cryptographic schemes such as NTRU, NTRU Prime, BLISS and more.
Wunderer Thomas
doaj   +1 more source

Home - About - Disclaimer - Privacy