×

Found 14 Documents (Results 1–14)

Panther: a sponge based lightweight authenticated encryption scheme. (English) Zbl 1514.94043

Adhikari, Avishek (ed.) et al., Progress in cryptology – INDOCRYPT 2021. 22nd International conference on cryptology in India, Jaipur, India, December 12–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13143, 49-70 (2021).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Post-quantum security of the sponge construction. (English) Zbl 1426.81031

Lange, Tanja (ed.) et al., Post-quantum cryptography. 9th international conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9–11, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10786, 185-204 (2018).
MSC:  81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Sandwich construction for keyed sponges: independence between capacity and online queries. (English) Zbl 1398.94144

Foresti, Sara (ed.) et al., Cryptology and network security. 15th international conference, CANS 2016, Milan, Italy, November 14–16, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-48964-3/pbk; 978-3-319-48965-0/ebook). Lecture Notes in Computer Science 10052, 245-261 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

CTM-sp: a family of cryptographic hash functions from chaotic tent maps. (English) Zbl 1403.94090

Liu, Joseph K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-40252-9/pbk; 978-3-319-40253-6/ebook). Lecture Notes in Computer Science 9722, 329-342 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security of full-state keyed sponge and duplex: applications to authenticated encryption. (English) Zbl 1382.94142

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 465-489 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Security of keyed sponge constructions using a modular proof approach. (English) Zbl 1382.94045

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 364-384 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Beyond modes: building a secure record protocol from a cryptographic sponge permutation. (English) Zbl 1337.94067

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 270-285 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Sufficient conditions on padding schemes of sponge construction and sponge-based authenticated-encryption scheme. (English) Zbl 1295.94032

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 545-563 (2012).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Duplexing the sponge: Single-pass authenticated encryption and other applications. (English) Zbl 1292.94030

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 320-337 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

all top 3

Software