Results 31 to 40 of about 93,608 (187)
CAESAR has caused a heated discussion regarding the merits of one-pass encryption and online ciphers. The latter is a keyed, length preserving function which outputs ciphertext blocks as soon as the respective plaintext block is available as input.
Elena Andreeva +5 more
doaj +1 more source
1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher
A multi-forkcipher (MFC) is a generalization of the forkcipher (FC) primitive introduced by Andreeva et al. at ASIACRYPT’19. An MFC is a tweakable cipher that computes s output blocks for a single input block, with s arbitrary but fixed.
Elena Andreeva +3 more
doaj +1 more source
New Constructions of MACs from (Tweakable) Block Ciphers
We propose new constructions of Message Authentication Codes (MACs) from tweakable or conventional block ciphers. Our new schemes are either stateless and deterministic, nonce-based, or randomized, and provably secure either in the standard model for ...
Benoît Cogliati +2 more
doaj +1 more source
Stream ciphers are vulnerable to generic time-memory-data tradeoff attacks. These attacks reduce the security level to half of the cipher’s internal state size.
Matthias Hamann +3 more
doaj +1 more source
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF
SUM-ECBC (Yasuda, CT-RSA 2010) is the first beyond birthday bound (BBB) secure block cipher based deterministic MAC. After this work, some more BBB secure deterministic MACs have been proposed, namely PMAC_Plus (Yasuda, CRYPTO 2011), 3kf9 (Zhang et al ...
Nilanjan Datta +3 more
doaj +1 more source
ABSTRACT A Summer Research Program (SRP) at a large public university in the southern United States prepares undergraduate STEM majors to engage with high school students from underrepresented backgrounds. Grounded in culturally responsive pedagogy (CRP) and layered mentorship, SRP fosters inclusive teaching practices and professional growth among ...
Mariam A. Manuel +4 more
wiley +1 more source
ABSTRACT Background Adolescence is a period when families must balance emotional connection with growing autonomy. How family functioning supports well‐being during this transition remains unclear, particularly in cultural contexts that value harmony amid difference.
Tiange Sui, Jerf W. K. Yeung
wiley +1 more source
Cymric: Short-tailed but Mighty
Authenticated encryption (AE) is a fundamental tool in today’s secure communication. Numerous designs have been proposed, including well-known standards such as GCM.
Alexandre Adomnicăi +4 more
doaj +1 more source
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption
Fresh rekeying is a well-established method to protect a primitive or mode against side-channel attacks: an easy to protect but cryptographically not so involved function generates a subkey from the master key, and this subkey is then used for the block encryption of a single or a few messages. It is an efficient way to achieve side-channel protection,
openaire +2 more sources
The prevalence of envelope wages in the Baltic Sea region [PDF]
Purpose - The purpose of this paper is to evaluate in the Baltic Sea region the prevalence of an illegitimate wage arrangement whereby formal employers pay their formal employees both an official declared wage as well as a supplementary undeclared ...
Williams, C.C.
core +1 more source

