Results 101 to 110 of about 1,402 (165)
Spatiotemporal organization of membrane protein controls bacterial extracellular electron transfer. [PDF]
Park Y +7 more
europepmc +1 more source
Hash3: Proofs, Analysis and Implementation:Report on ECRYPT II Event on Hash Functions [PDF]
Gauravaram, Praveen
core
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Indifferentiability for Public Key Cryptosystems
Lecture Notes in Computer Science, 2020We initiate the study of indifferentiability for public key encryption and other public key primitives. Our main results are definitions and constructions of public key cryptosystems that are indifferentiable from ideal cryptosystems, in the random oracle model.
Mark Zhandry, Cong Zhang
exaly +3 more sources
Constructing Random Oracles—Indifferentiability
2021The holy grail of hash function design is to construct a hash function which behaves like a random oracle. This is, of course, impossible (see Chapter 12). Nevertheless, while we know that we cannot construct an actual random oracle the goal should still be to come as close as possible.
Arno Mittelbach, Marc Fischlin
openaire +2 more sources
Indifferentiability of Truncated Random Permutations
International Conference on the Theory and Application of Cryptology and Information Security, 2019One of natural ways of constructing a pseudorandom function from a pseudorandom permutation is to simply truncate the output of the permutation. When n is the permutation size and m is the number of truncated bits, the resulting construction is known to be indistinguishable from a random function up to \(2^{{n+m}\over 2}\) queries, which is tight.
Wonseok Choi +2 more
openaire +2 more sources
Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher
Lecture Notes in Computer Science, 2023M. Nandi, Sayantan Paul, Abishanka Saha
exaly +2 more sources
Redeeming Reset Indifferentiability and Applications to Post-quantum Security
Lecture Notes in Computer Science, 2021Mark Zhandry
exaly +2 more sources
On the sequential indifferentiability of the Lai–Massey construction
Designs, Codes, and CryptographyYiyuan Luo
exaly +2 more sources

