Results 11 to 20 of about 1,527 (301)
Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks
Recent works of Cogliati et al. (CRYPTO 2018) have initiated provable treatments of Substitution-Permutation Networks (SPNs), one of the most popular approach to construct modern blockciphers.
Yuan Gao +4 more
doaj +1 more source
On one Block Cipher Mode of Operation Used to Protect Data on Block-Oriented Storage Devices
This research purpose is to develop a reduction-based method for analysis of cryptographic properties of block cipher modes of operation in context of full disk encryption (FDE) via provable security technique, to study weaknesses of widely spread among ...
Georgii Firsov, Alisa Koreneva
doaj +1 more source
Short Proxy Signature Scheme with Provable Security [PDF]
In order to avoid network congestion,and reduce the data flow,based on bilinear mapping,this paper proposes short proxy signature scheme with only one group element,including the signature definition,the construction of new scheme and the security ...
HUANG Rufen,HUANG Zhenjie,CHEN Qunshan,NONG Qiang
doaj +1 more source
Provably Secure Encryption Schemes With Zero Setup and Linear Speed by Using Rubik’s Cubes
Recently, new paradigms for designing modern cryptographic schemes were proposed based on Rubik's rotations. However, most of them lack rigorous provable security reductions.
Ping Pan +3 more
doaj +1 more source
Provably Secure Steganography [PDF]
Informally, steganography is the process of sending a secret message from Alice to Bob in such a way that an eavesdropper (who listens to all communications) cannot even tell that a secret message is being sent. In this work, we initiate the study of steganography from a complexity-theoretic point of view.
Nicholas Hopper +2 more
openaire +2 more sources
A Provable Secure Session Key Distribution Protocol Based on NSSK for In-Vehicle CAN Network
Many CAN-based session key sharing approaches are based on the group key scheme, which can easily lead advanced adversaries to infiltrate all ECUs (electronic control units) in the network if the sharing key is leaked.
Long Yin, Jian Xu, Zihao Wang, Chen Wang
doaj +1 more source
Provable Secure Parallel Gadgets
Side-channel attacks are a fundamental threat to the security of cryptographic implementations. One of the most prominent countermeasures against side-channel attacks is masking, where each intermediate value of the computation is secret shared, thereby concealing the computation’s sensitive information.
Francesco Berti +2 more
openaire +2 more sources
Provably Quantum-Secure Tweakable Block Ciphers
Recent results on quantum cryptanalysis show that some symmetric key schemes can be broken in polynomial time even if they are proven to be secure in the classical setting.
Akinori Hosoyamada, Tetsu Iwata
doaj +1 more source
Practical and Provably Secure Distance-Bounding [PDF]
AbstractFrom contactless payments to remote car unlocking, many applications are vulnerable to relay attacks. Distance bounding protocols are the main practical countermeasure against these attacks. In this paper, we present a formal analysis of SKI, which recently emerged as the first family of lightweight and provably secure distance bounding ...
Boureanu, Ioana +2 more
openaire +3 more sources
Provable security against generic attacks on stream ciphers
Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power ...
Moch Alexander
doaj +1 more source

