Results 111 to 120 of about 3,739 (238)
Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256 [PDF]
Christina Boura, Anne Canteaut
openalex +1 more source
SDN Controller Selection and Secure Resource Allocation
Software Defined Networking (SDN) has emerged as a promising paradigm for network management. However, in energy-effective task scheduling and security, the centralized control architecture of SDN brings challenges.
Sasibhushana Rao Pappu +1 more
doaj +1 more source
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture. [PDF]
Lee J, Kim W, Kim JH.
europepmc +1 more source
Autenticación no interactiva para internet de las cosas [PDF]
En este trabajo se propone un esquema de intercambio de información confidencial en entornos no seguros sobre redes móviles ad-hoc, basado en el concepto de demostración de conocimiento nulo no interactiva.
Caballero Gil, Cándido +2 more
core
A Semantic Framework for the Security Analysis of Ethereum smart contracts
Smart contracts are programs running on cryptocurrency (e.g., Ethereum) blockchains, whose popularity stem from the possibility to perform financial transactions, such as payments and auctions, in a distributed environment without need for any trusted ...
A Biryukov +6 more
core +2 more sources
Farfalle: parallel permutation-based cryptography
In this paper, we introduce Farfalle, a new permutation-based construction for building a pseudorandom function (PRF). The PRF takes as input a key and a sequence of arbitrary-length data strings, and returns an arbitrary-length output.
Guido Bertoni +5 more
doaj +1 more source
An Alternative Paradigm for Developing and Pricing Storage on Smart Contract Platforms
Smart contract platforms facilitate the development of important and diverse distributed applications in a simple manner. This simplicity stems from the inherent utility of employing the state of smart contracts to store, query and verify the validity of
Patsonakis, Christos, Roussopoulos, Mema
core +1 more source
Differential and Linear properties of vectorial boolean functions based on chi. [PDF]
Mella S, Mehrdad A, Daemen J.
europepmc +1 more source
Linear Cancellations in the MitM Attacks on Sponge Functions
At EUROCRYPT 2023, Qin et al. proposed the MitM attack framework on sponge functions by separating the message bits into two sets of neutral bits.
Lingyue Qin +5 more
doaj +1 more source

