×

Found 36 Documents (Results 1–36)

Cryptanalysis of Ascon. (English) Zbl 1382.94096

Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 371-387 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC. (English) Zbl 1375.94127

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 368-387 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Parallel hashing via list recoverability. (English) Zbl 1351.94050

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 173-190 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function. (English) Zbl 1370.94506

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 733-761 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers. (English) Zbl 1378.94061

Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 346-365 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Related-key attacks against full Hummingbird-2. (English) Zbl 1321.94088

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 467-482 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

CBEAM: efficient authenticated encryption from feebly one-way \(\varphi \) functions. (English) Zbl 1337.94066

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 251-269 (2014).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Provable security of BLAKE with non-ideal compression function. (English) Zbl 1327.94027

Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 321-338 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Extracts from the SHA-3 competition. (English) Zbl 1327.94070

Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 81-85 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential power analysis of MAC-Keccak at any key-length. (English) Zbl 1414.94918

Sakiyama, Kazuo (ed.) et al., Advances in information and computer security. 8th international workshop on security, IWSEC 2013, Okinawa, Japan, November 18–20, 2013. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8231, 68-82 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the indifferentiability of key-alternating ciphers. (English) Zbl 1310.94124

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 531-550 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Keccak. (English) Zbl 1306.94028

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 313-314 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes. (English) Zbl 1290.94053

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 138-155 (2012).
MSC:  94A60 94B60
PDFBibTeX XMLCite
Full Text: DOI

Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract). (English) Zbl 1290.94044

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 45-62 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Duplexing the sponge: Single-pass authenticated encryption and other applications. (English) Zbl 1292.94030

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 320-337 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Lightweight implementations of SHA-3 candidates on FPGAs. (English) Zbl 1291.94110

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 270-289 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical analysis of reduced-round Keccak. (English) Zbl 1291.94136

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 236-254 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Higher-order differential properties of Keccak and Luffa. (English) Zbl 1307.94040

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 252-269 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The NIST SHA-3 competition: a perspective on the final year. (English) Zbl 1280.94092

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 383-386 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Really fast syndrome-based hashing. (English) Zbl 1280.94039

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 134-152 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

A low-area yet performant FPGA implementation of Shabal. (English) Zbl 1290.94062

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 99-113 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256. (English) Zbl 1290.94048

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 1-17 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

Year of Publication

Main Field

all top 3

Software