Results 61 to 70 of about 856 (103)
Analysis of a key exchange protocol based on tropical matrix algebra
In this paper, we consider a two party key-exchange protocol proposed in [D. Grigoriev and V. Shpilrain, Tropical cryptography, Comm. Algebra 43 (2014), 2624–2632, Section 2], which uses tropical matrix algebra as the platform.
Kotov Matvei, Ushakov Alexander
doaj +1 more source
Differential and Linear properties of vectorial boolean functions based on chi. [PDF]
Mella S, Mehrdad A, Daemen J.
europepmc +1 more source
Fast hash functions and convolution product
We propose a new simple and efficient family of hash functions based on matrix-vector multiplications with a competitive software implementation. The hash design combines a hard mathematical problem based on solving a system of linear equations with ...
Omar Sami, Sabri Houssem
doaj +1 more source
Two-permutation-based hashing with binary mixing
We consider the generic design of compression functions based on two n-bit permutations and XOR-based mixing functions. It is known that any such function mapping n+α${n+\alpha }$ to α bits, with 1≤α≤n${1\le \alpha \le n}$, can achieve at most min{2α/2 ...
Luykx Atul +3 more
doaj +1 more source
From Random Numbers to Random Objects. [PDF]
Zolfaghari B, Bibak K, Koshiba T.
europepmc +1 more source
A note on some algebraic trapdoors for block ciphers
We provide sufficient conditions to guarantee that a translation based cipher is not vulnerable with respect to the partition-based trapdoor. This trapdoor has been introduced, recently, by Bannier et al.
Calderini, Marco
core
Revisiting linearly extended discrete functions
The authors introduced a new family of cryptographic schemes in a previous research article, which includes many practical encryption schemes, such as the Feistel family. Given a finite field of order qq, any n>m≥0n\gt m\ge 0, the authors described a new
Gravel Claude, Panario Daniel
doaj +1 more source
Rumour prevention in social networks with layer 2 blockchains. [PDF]
Thakur S, Breslin JG.
europepmc +1 more source
Orienteering with One Endomorphism. [PDF]
Arpin S +5 more
europepmc +1 more source
Functional encryption for set intersection in the multi-client setting. [PDF]
Lee K, Seo M.
europepmc +1 more source

