Results 1 to 10 of about 1,275,223 (320)
Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication
In this paper we introduce a new keyed hash function based on 32-bit integer multiplication that we call Multimixer-128. In our approach, we follow the key-then-hash parallel paradigm. So, we first add a variable length input message to a secret key and
Koustabh Ghosh+2 more
doaj +1 more source
BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions
Recently, a memory safety concept called Cryptographic Capability Computing (C3) has been proposed. C3 is the first memory safety mechanism that works without requiring extra storage for metadata and hence, has the potential to significantly enhance the
Yanis Belkheyar+4 more
doaj +1 more source
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj +1 more source
Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers
In ToSC 2018(4), Daemen et al. performed an in-depth investigation of sound hashing modes based on arbitrary functions, permutations, or block ciphers. However, for the case of invertible primitives, there is a glitch.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj +1 more source
Compact Dilithium Implementations on Cortex-M3 and Cortex-M4
We present implementations of the lattice-based digital signature scheme Dilithium for ARM Cortex-M3 and ARM Cortex-M4. Dilithium is one of the three signature finalists of the NIST post-quantum cryptography competition.
Denisa O. C. Greconici+2 more
doaj +3 more sources
Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96
Cryptographic competitions, like the ongoing NIST call for lightweight cryptography, always provide a thriving research environment, where new interesting ideas are proposed and new cryptographic insights are made. One proposal for this NIST call that is
Christoph Dobraunig+2 more
doaj +1 more source
In industrial environments there are critical devices, so their correct operation must be ensured. In particular, having a secure record of the different events related to these devices is essential.
José Álvaro Fernández-Carrasco+4 more
doaj +1 more source
Security of the Suffix Keyed Sponge
We formalize and analyze the general suffix keyed sponge construction, a pseudorandom function built on top of a cryptographic permutation. The construction hashes its data using the (keyless) sponge construction, transforms part of the state using the ...
Christoph Dobraunig, Bart Mennink
doaj +1 more source
Security and Independence of Process Safety and Control Systems in the Petroleum Industry
The developments of reduced manning on offshore facilities and increased information transfer from offshore to land continue and may also be a prerequisite for the future survival of the oil and gas industry.
Tor Onshus+8 more
doaj +1 more source
Practical Evaluation of Protected Residue Number System Scalar Multiplication
The Residue Number System (RNS) arithmetic is gaining grounds in public key cryptography, because it offers fast, efficient and secure implementations over large prime fields or rings of integers.
Louiza Papachristodoulou+3 more
doaj +1 more source