Results 71 to 80 of about 1,484 (155)

A Standalone FPGA-based Miner for Lyra2REv2 Cryptocurrencies

open access: yes, 2020
Lyra2REv2 is a hashing algorithm that consists of a chain of individual hashing algorithms, and it is used as a proof-of-work function in several cryptocurrencies.
Balatsoukas-Stimming, Alexios   +4 more
core   +2 more sources

Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs [PDF]

open access: yes, 2008
We create variable-length pseudorandom permutations (PRPs) and strong PRPs (SPRPs) accepting any input length chosen from the range of b to 2b bits from fixed-length, b-bit PRPs.
Cook, Debra L.   +2 more
core   +2 more sources

Trusted Computing using Enhanced Manycore Architectures with Cryptoprocessors

open access: yes, 2014
International audienceManycore architectures correspond to a main evolution of computing systems due to their high processing power. Many applications can be executed in parallel which provides users with a very efficient technology.
Baganne, A   +5 more
core   +1 more source

Tweakable ForkCipher from Ideal Block Cipher

open access: yesIACR Communications in Cryptology
In ASIACRYPT 2019, Andreeva et al. introduced a new symmetric key primitive called the forkcipher, designed for lightweight applications handling short messages. A forkcipher is a keyed function with a public tweak, featuring fixed-length input and fixed-length (expanding) output.
openaire   +1 more source

Cryptanalysis of Full-Round BipBip

open access: yesIACR Transactions on Symmetric Cryptology
BipBip is a low-latency tweakable block cipher proposed by Belkheyar et al. in 2023. It was designed for pointer encryption inside a new memory safety mechanism called Cryptographic Capability Computing (C3). BipBip encrypts blocks of 24 bits using a 40-
Jinliang Wang   +5 more
doaj   +1 more source

PERBANDINGAN ALGORITMA AES DENGAN ALGORITMA XTS-AES UNTUK ENKRIPSI DAN DEKRIPSI TEKS SMS BERBASIS JAVA ME [PDF]

open access: yes
SMS sudah menjadi kebutuhan sehari-hari bagi semua kalangan masyarakat. Pengiriman suatu informasi dengan menggunakan SMS memerlukan suatu proses yang menjamin keamanan pesan yang dikirim.
Mariana, Mariana, Sari, Martha
core  

ZMAC+ – An Efficient Variable-output-length Variant of ZMAC

open access: yesIACR Transactions on Symmetric Cryptology, 2017
There is an ongoing trend in the symmetric-key cryptographic community to construct highly secure modes and message authentication codes based on tweakable block ciphers (TBCs).
Eik List, Mridul Nandi
doaj   +1 more source

Elastic Block Ciphers: Method, Security and Instantiations [PDF]

open access: yes, 2009
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size ...
Cook, Debra L.   +2 more
core   +3 more sources

Tweakable enciphering schemes using only the encryption function of a block cipher [PDF]

open access: yesInformation Processing Letters, 2011
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +1 more source

Memory Encryption for Smart Cards Barı¸s Ege 1, Elif Bilge Kavun 2,andTolgaYalçın 2 [PDF]

open access: yes
. With the latest advances in attack methods, it has become increasingly more difficult to secure data stored on smart cards, especially on non-volatile memories (NVMs), which may store sensitive information such as cryptographic keys or program code ...

core  

Home - About - Disclaimer - Privacy