×

Found 1,856 Documents (Results 1–100)

Algorithms for matrix code and alternating trilinear form equivalences via new isomorphism invariants. (English) Zbl 07943264

Joye, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2024. 43rd annual international conference on the theory and applications of cryptographic techniques, Zurich, Switzerland, May 26–30, 2024. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14653, 160-187 (2024).
Full Text: DOI

Tight security of TNT and beyond. Attacks, proofs and possibilities for the cascaded LRW paradigm. (English) Zbl 07942299

Joye, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2024. 43rd annual international conference on the theory and applications of cryptographic techniques, Zurich, Switzerland, May 26–30, 2024. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14651, 249-279 (2024).
MSC:  94A60
Full Text: DOI

Forgery attacks on several beyond-birthday-bound secure MACs. (English) Zbl 1547.94417

Guo, Jian (ed.) et al., Advances in cryptology – ASIACRYPT 2023. 29th international conference on the theory and application of cryptology and information security, Guangzhou, China, December 4–8, 2023. Proceedings. Part III. Singapore: Springer. Lect. Notes Comput. Sci. 14440, 169-189 (2023).
MSC:  94A60 94A62 68P25
Full Text: DOI

A new algebraic approach to the regular syndrome decoding problem and implications for PCG constructions. (English) Zbl 1528.94037

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14008, 391-422 (2023).

XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation. (English) Zbl 1528.94032

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14007, 532-561 (2023).
MSC:  94A60 94A62
Full Text: DOI

Proof of mirror theory for a wide range of \(\xi_{\max }\). (English) Zbl 1532.94037

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14007, 470-501 (2023).
MSC:  94A60
Full Text: DOI

A non-heuristic approach to time-space tradeoffs and optimizations for BKW. (English) Zbl 1519.94162

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13793, 741-770 (2023).
MSC:  94A60
Full Text: DOI

Key-reduced variants of 3Kf9 with beyond-birthday-bound security. (English) Zbl 1519.94186

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13792, 525-554 (2023).
MSC:  94A60 94A62
Full Text: DOI

Categorization of faulty nonce misuse resistant message authentication. (English) Zbl 1514.94064

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13092, 520-550 (2021).
Full Text: DOI

Toward a fully secure authenticated encryption scheme from a pseudorandom permutation. (English) Zbl 1514.94066

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13092, 407-434 (2021).
MSC:  94A60 94A62
Full Text: DOI

Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting. (English) Zbl 1487.94137

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 309-336 (2021).
MSC:  94A60
Full Text: DOI

On the cost of ASIC hardware crackers: a SHA-1 case study. (English) Zbl 07449896

Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 657-681 (2021).
MSC:  68P25 94A60

Improved security analysis for nonce-based enhanced hash-then-mask MACs. (English) Zbl 1511.94076

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 697-723 (2020).
MSC:  94A60 94A62
Full Text: DOI

Beyond birthday bound secure fresh rekeying: application to authenticated encryption. (English) Zbl 1511.94136

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 630-661 (2020).
MSC:  94A60 94A62
Full Text: DOI

Lightweight authenticated encryption mode suitable for threshold implementation. (English) Zbl 1492.94150

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 705-735 (2020).
MSC:  94A60 68P25 94A62
Full Text: DOI

Optimal merging in quantum \(k\)-xor and \(k\)-sum algorithms. (English) Zbl 1489.81021

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 311-340 (2020).

Tight security bounds for double-block hash-then-sum MACs. (English) Zbl 1479.94327

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 435-465 (2020).
MSC:  94A62 94A60
Full Text: DOI

Quantum algorithms for the \(k\)-XOR problem. (English) Zbl 1446.94132

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 527-559 (2018).
MSC:  94A60 68Q12

Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model. (English) Zbl 1446.94148

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 305-335 (2018).
MSC:  94A60
Full Text: DOI

Short variable length domain extenders with beyond birthday bound security. (English) Zbl 1446.94116

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 244-274 (2018).
MSC:  94A60

Provable security of (tweakable) block ciphers based on substitution-permutation networks. (English) Zbl 1444.94055

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10991, 722-753 (2018).
MSC:  94A60

A birthday repetition theorem and complexity of approximating dense CSPs. (English) Zbl 1441.68048

Chatzigiannakis, Ioannis (ed.) et al., 44th international colloquium on automata, languages, and programming, ICALP 2017, Warsaw, Poland July 10–14, 2017. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 80, Article 78, 15 p. (2017).

Honest signaling in zero-sum games is hard, and lying is even harder. (English) Zbl 1441.68080

Chatzigiannakis, Ioannis (ed.) et al., 44th international colloquium on automata, languages, and programming, ICALP 2017, Warsaw, Poland July 10–14, 2017. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 80, Article 77, 13 p. (2017).

Blockcipher-based MACs: beyond the birthday bound without message length. (English) Zbl 1417.94076

Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10626, 446-470 (2017).
MSC:  94A60 94A62
Full Text: DOI

Filter Results by …

Access

Document Type

Database

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Biographic Reference

all top 3

Software