Results 101 to 110 of about 1,402 (165)

Spatiotemporal organization of membrane protein controls bacterial extracellular electron transfer. [PDF]

open access: yesNat Commun
Park Y   +7 more
europepmc   +1 more source

Cryptographic Hash Functions [PDF]

open access: yes, 2009
Thomsen, Søren Steffen
core   +1 more source

Indifferentiability for Public Key Cryptosystems

Lecture Notes in Computer Science, 2020
We initiate the study of indifferentiability for public key encryption and other public key primitives. Our main results are definitions and constructions of public key cryptosystems that are indifferentiable from ideal cryptosystems, in the random oracle model.
Mark Zhandry, Cong Zhang
exaly   +3 more sources

Constructing Random Oracles—Indifferentiability

2021
The holy grail of hash function design is to construct a hash function which behaves like a random oracle. This is, of course, impossible (see Chapter 12). Nevertheless, while we know that we cannot construct an actual random oracle the goal should still be to come as close as possible.
Arno Mittelbach, Marc Fischlin
openaire   +2 more sources

Indifferentiability of Truncated Random Permutations

International Conference on the Theory and Application of Cryptology and Information Security, 2019
One of natural ways of constructing a pseudorandom function from a pseudorandom permutation is to simply truncate the output of the permutation. When n is the permutation size and m is the number of truncated bits, the resulting construction is known to be indistinguishable from a random function up to \(2^{{n+m}\over 2}\) queries, which is tight.
Wonseok Choi   +2 more
openaire   +2 more sources

Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher

Lecture Notes in Computer Science, 2023
M. Nandi, Sayantan Paul, Abishanka Saha
exaly   +2 more sources

Home - About - Disclaimer - Privacy