Results 71 to 80 of about 1,484 (155)
A Standalone FPGA-based Miner for Lyra2REv2 Cryptocurrencies
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms, and it is used as a proof-of-work function in several cryptocurrencies.
Balatsoukas-Stimming, Alexios +4 more
core +2 more sources
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs [PDF]
We create variable-length pseudorandom permutations (PRPs) and strong PRPs (SPRPs) accepting any input length chosen from the range of b to 2b bits from fixed-length, b-bit PRPs.
Cook, Debra L. +2 more
core +2 more sources
Trusted Computing using Enhanced Manycore Architectures with Cryptoprocessors
International audienceManycore architectures correspond to a main evolution of computing systems due to their high processing power. Many applications can be executed in parallel which provides users with a very efficient technology.
Baganne, A +5 more
core +1 more source
Tweakable ForkCipher from Ideal Block Cipher
In ASIACRYPT 2019, Andreeva et al. introduced a new symmetric key primitive called the forkcipher, designed for lightweight applications handling short messages. A forkcipher is a keyed function with a public tweak, featuring fixed-length input and fixed-length (expanding) output.
openaire +1 more source
Cryptanalysis of Full-Round BipBip
BipBip is a low-latency tweakable block cipher proposed by Belkheyar et al. in 2023. It was designed for pointer encryption inside a new memory safety mechanism called Cryptographic Capability Computing (C3). BipBip encrypts blocks of 24 bits using a 40-
Jinliang Wang +5 more
doaj +1 more source
PERBANDINGAN ALGORITMA AES DENGAN ALGORITMA XTS-AES UNTUK ENKRIPSI DAN DEKRIPSI TEKS SMS BERBASIS JAVA ME [PDF]
SMS sudah menjadi kebutuhan sehari-hari bagi semua kalangan masyarakat. Pengiriman suatu informasi dengan menggunakan SMS memerlukan suatu proses yang menjamin keamanan pesan yang dikirim.
Mariana, Mariana, Sari, Martha
core
ZMAC+ – An Efficient Variable-output-length Variant of ZMAC
There is an ongoing trend in the symmetric-key cryptographic community to construct highly secure modes and message authentication codes based on tweakable block ciphers (TBCs).
Eik List, Mridul Nandi
doaj +1 more source
Elastic Block Ciphers: Method, Security and Instantiations [PDF]
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size ...
Cook, Debra L. +2 more
core +3 more sources
Tweakable enciphering schemes using only the encryption function of a block cipher [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +1 more source
Memory Encryption for Smart Cards Barı¸s Ege 1, Elif Bilge Kavun 2,andTolgaYalçın 2 [PDF]
. With the latest advances in attack methods, it has become increasingly more difficult to secure data stored on smart cards, especially on non-volatile memories (NVMs), which may store sensitive information such as cryptographic keys or program code ...
core

