Results 31 to 40 of about 1,329 (153)
09031 Abstracts Collection -- Symmetric Cryptography [PDF]
From 11.01.09 to 16.01.09, the Seminar 09031 in ``Symmetric Cryptography \u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open ...
Handschuh, Helena +3 more
core +1 more source
Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core +1 more source
MergeMAC:A MAC for Authentication with Strict Time Constraints and Limited Bandwidth [PDF]
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time requirements and extremely limited bandwidth. MergeMAC computes the MAC by splitting the message into two parts.
Ankele, Ralph +2 more
core +2 more sources
Improved Security Bounds for Generalized Feistel Networks
We revisit the security of various generalized Feistel networks. Concretely, for unbalanced, alternating, type-1, type-2, and type-3 Feistel networks built from random functions, we substantially improve the coupling analyzes of Hoang and Rogaway (CRYPTO
Yaobin Shen, Chun Guo, Lei Wang
doaj +1 more source
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression [PDF]
International audienceIn typical applications of homomorphic encryption, the first step consists for Alice to encrypt some plaintext m under Bob’s public key pk and to send the ciphertext c = HEpk(m) to some third-party evaluator Charlie.
Canteaut, Anne +6 more
core +6 more sources
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs [PDF]
We create variable-length pseudorandom permutations (PRPs) and strong PRPs (SPRPs) accepting any input length chosen from the range of b to 2b bits from fixed-length, b-bit PRPs.
Cook, Debra L. +2 more
core +2 more sources
Clustering Related-Tweak Characteristics: Application to MANTIS-6
The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule. Several recent attacks have analyzed the implications of this approach for differential cryptanalysis and ...
Maria Eichlseder, Daniel Kales
doaj +1 more source
Extended Generalized Feistel Networks using Matrix Representation [PDF]
International audienceWhile Generalized Feistel Networks have been widely studied in the literature as a building block of a block cipher, we propose in this paper a unified vision to easily represent them through a matrix representation. We then propose
A Biryukov +23 more
core +3 more sources
HCTR+: An Optimally Secure TBC-Based Accordion Mode
The design of tweakable wide-block ciphers has advanced significantly over the past two decades. This evolution began with the wide-block cipher by Naor and Reingold.
Nilanjan Datta +4 more
doaj +1 more source
Efficient and Provable White-Box Primitives [PDF]
International audienceIn recent years there have been several attempts to build white-box block ciphers whose implementations aim to be incompress-ible.
A Biryukov +27 more
core +5 more sources

