×

Found 1,797 Documents (Results 1–100)

A non-heuristic approach to time-space tradeoffs and optimizations for BKW. (English) Zbl 07731561

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13793, 741-770 (2023).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Key-reduced variants of 3Kf9 with beyond-birthday-bound security. (English) Zbl 07728553

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13792, 525-554 (2023).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

Offset-based BBB-secure tweakable block-ciphers with updatable caches. (English) Zbl 07726564

Isobe, Takanori (ed.) et al., Progress in cryptology – INDOCRYPT 2022. 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13774, 171-194 (2023).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Pholkos – efficient large-state tweakable block ciphers from the AES round function. (English) Zbl 1492.94067

Galbraith, Steven D. (ed.), Topics in cryptology – CT-RSA 2022. Cryptographers’ track at the RSA conference 2022, virtual event, March 1–2, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13161, 511-536 (2022).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Categorization of faulty nonce misuse resistant message authentication. (English) Zbl 1514.94064

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13092, 520-550 (2021).
PDF BibTeX XML Cite
Full Text: DOI

Toward a fully secure authenticated encryption scheme from a pseudorandom permutation. (English) Zbl 1514.94066

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13092, 407-434 (2021).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting. (English) Zbl 1487.94137

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 309-336 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Attacks on beyond-birthday-bound MACs in the quantum setting. (English) Zbl 1485.94090

Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 421-441 (2021).
MSC:  94A60 94A62 81P94
PDF BibTeX XML Cite
Full Text: DOI

On the cost of ASIC hardware crackers: a SHA-1 case study. (English) Zbl 07449896

Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 657-681 (2021).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Design of hash function using two dimensional cellular automata. (English) Zbl 07388835

Giri, Debasis (ed.) et al., Proceedings of the fifth international conference on mathematics and computing, ICMC 2019, Bhubaneswar, India, February 6–9, 2019. Singapore: Springer. Adv. Intell. Syst. Comput. 1170, 33-45 (2021).
MSC:  68-XX
PDF BibTeX XML Cite
Full Text: DOI

Improved security analysis for nonce-based enhanced hash-then-mask MACs. (English) Zbl 1511.94076

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 697-723 (2020).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

Beyond birthday bound secure fresh rekeying: application to authenticated encryption. (English) Zbl 1511.94136

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 630-661 (2020).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

Lightweight authenticated encryption mode suitable for threshold implementation. (English) Zbl 1492.94150

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 705-735 (2020).
MSC:  94A60 68P25 94A62
PDF BibTeX XML Cite
Full Text: DOI

Optimal merging in quantum \(k\)-xor and \(k\)-sum algorithms. (English) Zbl 1489.81021

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 311-340 (2020).
PDF BibTeX XML Cite
Full Text: DOI

Tight security bounds for double-block hash-then-sum MACs. (English) Zbl 1479.94327

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 435-465 (2020).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Mind the composition: birthday bound attacks on EWCDMD and SoKAC21. (English) Zbl 1479.94337

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 203-220 (2020).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Vladimir Petrovich Platonov (on his 80th birthday). (English. Russian original) Zbl 1445.01024

Russ. Math. Surv. 75, No. 2, 387-391 (2020); translation from Usp. Mat. Nauk 75, No. 2, 197-200 (2020).
MSC:  01A70
PDF BibTeX XML Cite
Full Text: DOI MNR

Universal forgery attack against GCM-RUP. (English) Zbl 1457.94161

Jarecki, Stanislaw (ed.), Topics in cryptology – CT-RSA 2020. The cryptographers’ track at the RSA conference 2020, San Francisco, CA, USA, February 24–28, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12006, 15-34 (2020).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

How to build pseudorandom functions from public random permutations. (English) Zbl 1456.94064

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11692, 266-293 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Grigoriĭ Iosifovich Ol’shanskiĭ (on his 70th birthday). (English. Russian original) Zbl 1432.01083

Russ. Math. Surv. 74, No. 3, 555-577 (2019); translation from Usp. Mat. Nauk 74, No. 3, 193-213 (2019).
MSC:  01A70
PDF BibTeX XML Cite
Full Text: DOI

Improved XKX-based AEAD scheme: removing the birthday terms. (English) Zbl 1454.94089

Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 228-246 (2019).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

Parallelizable MACs based on the sum of PRPs with security beyond the birthday bound. (English) Zbl 1458.94308

Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11464, 131-151 (2019).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Evgeniĭ Mikhaĭlovich Chirka. (English. Russian original) Zbl 1412.01020

Russ. Math. Surv. 73, No. 6, 1137-1144 (2018); translation from Usp. Mat. Nauk 73, No. 6, 204-210 (2018).
MSC:  01A70
PDF BibTeX XML Cite
Full Text: DOI MNR

Aleksandr Semenovich Kholevo (on his 75th birthday). (English. Russian original) Zbl 1427.01012

Russ. Math. Surv. 73, No. 6, 1131-1136 (2018); translation from Usp. Mat. Nauk 73, No. 6, 199-203 (2018).
MSC:  01A70
PDF BibTeX XML Cite
Full Text: DOI MNR

Quantum algorithms for the \(k\)-XOR problem. (English) Zbl 1446.94132

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 527-559 (2018).
MSC:  94A60 68Q12
PDF BibTeX XML Cite
Full Text: DOI

Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model. (English) Zbl 1446.94148

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 305-335 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Short variable length domain extenders with beyond birthday bound security. (English) Zbl 1446.94116

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 244-274 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Length-preserving encryption based on single-key tweakable block cipher. (English) Zbl 1443.94086

Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 313-326 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Provable security of (tweakable) block ciphers based on substitution-permutation networks. (English) Zbl 1444.94055

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10991, 722-753 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Generic attacks against beyond-birthday-bound MACs. (English) Zbl 1444.94084

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10991, 306-336 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Can CAESAR beat Galois? Robustness of CAESAR candidates against nonce reusing and high data complexity attacks. (English) Zbl 1440.94102

Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 476-494 (2018).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

A birthday repetition theorem and complexity of approximating dense CSPs. (English) Zbl 1441.68048

Chatzigiannakis, Ioannis (ed.) et al., 44th international colloquium on automata, languages, and programming, ICALP 2017, Warsaw, Poland July 10–14, 2017. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 80, Article 78, 15 p. (2017).
PDF BibTeX XML Cite
Full Text: DOI arXiv

Honest signaling in zero-sum games is hard, and lying is even harder. (English) Zbl 1441.68080

Chatzigiannakis, Ioannis (ed.) et al., 44th international colloquium on automata, languages, and programming, ICALP 2017, Warsaw, Poland July 10–14, 2017. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 80, Article 77, 13 p. (2017).
PDF BibTeX XML Cite
Full Text: DOI arXiv

Blockcipher-based MACs: beyond the birthday bound without message length. (English) Zbl 1417.94076

Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10626, 446-470 (2017).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

A MAC mode for lightweight block ciphers. (English) Zbl 1387.94092

Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 43-59 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Simpira v2: a family of efficient permutations using the AES round function. (English) Zbl 1404.94077

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 95-125 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

EWCDM: an efficient, beyond-birthday secure, nonce-misuse resistant MAC. (English) Zbl 1351.94034

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 121-149 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Counter-in-Tweak: authenticated encryption modes for tweakable block ciphers. (English) Zbl 1351.94063

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 33-63 (2016).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

On the influence of message length in PMAC’s security bounds. (English) Zbl 1385.94057

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 596-621 (2016).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI Link

One-key compression function based MAC with security beyond birthday bound. (English) Zbl 1403.94056

Liu, Joseph K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-40252-9/pbk; 978-3-319-40253-6/ebook). Lecture Notes in Computer Science 9722, 343-358 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Valentin Anatol’evich Skvortsov (on his 80th birthday). (English. Russian original) Zbl 1377.01026

Russ. Math. Surv. 71, No. 1, 175-177 (2016); translation from Usp. Mat. Nauk 71, No. 1, 184-186 (2016).
MSC:  01A70
PDF BibTeX XML Cite
Full Text: DOI

Formal modelling and analysis of socio-technical systems. (English) Zbl 1478.91141

Probst, Christian W. (ed.) et al., Semantics, logics, and calculi. Essays dedicated to Hanne Riis Nielson and Flemming Nielson on the occasion of their 60th birthdays. Cham: Springer. Lect. Notes Comput. Sci. 9560, 54-73 (2016).
MSC:  91C99
PDF BibTeX XML Cite
Full Text: DOI Link

Filter Results by …

Document Type

Database

Reviewing State

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Biographic Reference

all top 3

Software