Results 121 to 130 of about 1,402 (165)
Some of the next articles are maybe not open access.
Gli intolleranti e gli indifferenti
Religioni e società : XXX, 83, 2015, 2015Sociologists have been deceived. Max Weber, one of the fathers of this discipline have assured that the process o secularization have gradually reduced the public impact of religions, limiting them to the private sphere. On the contrary in the third millennium, the religions still they have a collective importance in the public dimensions par ...
openaire +2 more sources
Some Observations on Indifferentiability
2010At Crypto 2005, Coron et al. introduced a formalism to study the presence or absence of structural flaws in iterated hash functions. If one cannot differentiate a hash function using ideal primitives from a random oracle, it is considered structurally sound, while the ability to differentiate it from a random oracle indicates a structural weakness ...
Ewan Fleischmann +2 more
openaire +1 more source
Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability
IACR Cryptology ePrint Archive, 2023Chris Peikert, Jiayu Xu
semanticscholar +1 more source
The Indifferentiability of the Duplex and Its Practical Applications
International Conference on the Theory and Application of Cryptology and Information Security, 2023Jean Paul Degabriele +2 more
semanticscholar +1 more source
Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules)
IACR Cryptology ePrint Archive, 2022Shanjie Xu, Qi Da, Chun Guo
semanticscholar +1 more source
Alberto Moravia, "Gli indifferenti"
2007L'edizione de "Gli indifferenti", pubblicata da Bompiani in occasione del centenario della nascita di Moravia come "nuova edizione ampliata", è introdotta da un saggio di S. Casini dal titolo "Il romanzo di una vita" (pp. 5-31). Tale introduzione ricostruisce in modo nuovo il rapporto tra lo scrittore e la sua opera prima, nella quale Moravia stesso ...
Casini, Simone, L. Desideri, T. Servillo
openaire +1 more source
Improved Indifferentiable Security Analysis of PHOTON
2014In this paper, we study the indifferentiable security of the domain extension algorithm of the PHOTON hash function that was proven to be indifferentiable from a random oracle up to \(\mathcal{O}(2^{\min\{ c/2, c^\prime/2 \}})\) query complexity, where c is the capacity in the absorbing step of PHOTON and c ′ is that in the squeezing step.
Yusuke Naito, Kazuo Ohta
openaire +1 more source
Improved indifferentiability security proof for 3-round tweakable Luby–Rackoff
Designs, Codes and Cryptography, 2021Ritam Bhaumik +2 more
semanticscholar +1 more source
Indifferentiable Security Reconsidered: Role of Scheduling
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011In this paper, the substitutability of the indifferentiability framework with non-sequential scheduling is examined by reformulating the framework through applying the Task-PIOA framework, which provides non-sequential activation with oblivious task sequences.
openaire +1 more source
How to Record Quantum Queries, and Applications to Quantum Indifferentiability
IACR Cryptology ePrint Archive, 2019Mark Zhandry
semanticscholar +1 more source

