Results 1 to 10 of about 114,269 (316)

Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In this paper we introduce a new keyed hash function based on 32-bit integer multiplication that we call Multimixer-128. In our approach, we follow the key-then-hash parallel paradigm. So, we first add a variable length input message to a secret key and
Koustabh Ghosh   +2 more
doaj   +1 more source

Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj   +1 more source

BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Recently, a memory safety concept called Cryptographic Capability Computing (C3) has been proposed. C3 is the first memory safety mechanism that works without requiring extra storage for metadata and hence, has the potential to significantly enhance the
Yanis Belkheyar   +4 more
doaj   +1 more source

Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In ToSC 2018(4), Daemen et al. performed an in-depth investigation of sound hashing modes based on arbitrary functions, permutations, or block ciphers. However, for the case of invertible primitives, there is a glitch.
Aldo Gunsing, Joan Daemen, Bart Mennink
doaj   +1 more source

Compact Dilithium Implementations on Cortex-M3 and Cortex-M4

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
We present implementations of the lattice-based digital signature scheme Dilithium for ARM Cortex-M3 and ARM Cortex-M4. Dilithium is one of the three signature finalists of the NIST post-quantum cryptography competition.
Denisa O. C. Greconici   +2 more
doaj   +3 more sources

Economic Resilience of Indonesian Farmers: Statistical and Machine Learning Approach for Sustainable Agribusiness Strategy [PDF]

open access: yesBIO Web of Conferences
Farmers' economic resilience plays a critical role in sustaining agricultural systems and national food security. This study analyzes Indonesia's Farmer Terms of Trade (NTP) from 2022-2025 using a hybrid methodology that integrates descriptive ...
Fitro Achmad   +3 more
doaj   +1 more source

Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Cryptographic competitions, like the ongoing NIST call for lightweight cryptography, always provide a thriving research environment, where new interesting ideas are proposed and new cryptographic insights are made. One proposal for this NIST call that is
Christoph Dobraunig   +2 more
doaj   +1 more source

Security Digital Evidence [PDF]

open access: yes2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010
Non-repudiation of digital evidence is required by various use cases in today’s business cases for example in the area of medical products but also in public use cases like congestion charges. These use cases have in common that at a certain time an evidence record is generated to attest for the occurrence of a certain event.
Jennifer Richter   +2 more
openaire   +1 more source

ChronoEOS 2.0: Device Fingerprinting and EOSIO Blockchain Technology for On-Running Forensic Analysis in an IoT Environment

open access: yesSmart Cities, 2023
In industrial environments there are critical devices, so their correct operation must be ensured. In particular, having a secure record of the different events related to these devices is essential.
José Álvaro Fernández-Carrasco   +4 more
doaj   +1 more source

Security of the Suffix Keyed Sponge

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We formalize and analyze the general suffix keyed sponge construction, a pseudorandom function built on top of a cryptographic permutation. The construction hashes its data using the (keyless) sponge construction, transforms part of the state using the ...
Christoph Dobraunig, Bart Mennink
doaj   +1 more source

Home - About - Disclaimer - Privacy