Results 31 to 40 of about 1,329 (153)

09031 Abstracts Collection -- Symmetric Cryptography [PDF]

open access: yes, 2009
From 11.01.09 to 16.01.09, the Seminar 09031 in ``Symmetric Cryptography \u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open ...
Handschuh, Helena   +3 more
core   +1 more source

Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]

open access: yes, 2017
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core   +1 more source

MergeMAC:A MAC for Authentication with Strict Time Constraints and Limited Bandwidth [PDF]

open access: yes, 2018
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time requirements and extremely limited bandwidth. MergeMAC computes the MAC by splitting the message into two parts.
Ankele, Ralph   +2 more
core   +2 more sources

Improved Security Bounds for Generalized Feistel Networks

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We revisit the security of various generalized Feistel networks. Concretely, for unbalanced, alternating, type-1, type-2, and type-3 Feistel networks built from random functions, we substantially improve the coupling analyzes of Hoang and Rogaway (CRYPTO
Yaobin Shen, Chun Guo, Lei Wang
doaj   +1 more source

Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression [PDF]

open access: yes, 2015
International audienceIn typical applications of homomorphic encryption, the first step consists for Alice to encrypt some plaintext m under Bob’s public key pk and to send the ciphertext c = HEpk(m) to some third-party evaluator Charlie.
Canteaut, Anne   +6 more
core   +6 more sources

Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs [PDF]

open access: yes, 2008
We create variable-length pseudorandom permutations (PRPs) and strong PRPs (SPRPs) accepting any input length chosen from the range of b to 2b bits from fixed-length, b-bit PRPs.
Cook, Debra L.   +2 more
core   +2 more sources

Clustering Related-Tweak Characteristics: Application to MANTIS-6

open access: yesIACR Transactions on Symmetric Cryptology, 2018
The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule. Several recent attacks have analyzed the implications of this approach for differential cryptanalysis and ...
Maria Eichlseder, Daniel Kales
doaj   +1 more source

Extended Generalized Feistel Networks using Matrix Representation [PDF]

open access: yes, 2013
International audienceWhile Generalized Feistel Networks have been widely studied in the literature as a building block of a block cipher, we propose in this paper a unified vision to easily represent them through a matrix representation. We then propose
A Biryukov   +23 more
core   +3 more sources

HCTR+: An Optimally Secure TBC-Based Accordion Mode

open access: yesIACR Transactions on Symmetric Cryptology
The design of tweakable wide-block ciphers has advanced significantly over the past two decades. This evolution began with the wide-block cipher by Naor and Reingold.
Nilanjan Datta   +4 more
doaj   +1 more source

Efficient and Provable White-Box Primitives [PDF]

open access: yes, 2016
International audienceIn recent years there have been several attempts to build white-box block ciphers whose implementations aim to be incompress-ible.
A Biryukov   +27 more
core   +5 more sources

Home - About - Disclaimer - Privacy