Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Byeonghak Lee"'
Autor:
Benoît Cogliati, Jordan Ethan, Virginie Lallemand, Byeonghak Lee, Jooyoung Lee, Marine Minier
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 4 (2021)
In this work, we propose a construction of 2-round tweakable substitutionpermutation networks using a single secret S-box. This construction is based on non-linear permutation layers using independent round keys, and achieves security beyond the birt
Externí odkaz:
https://doaj.org/article/2edadb90ee6c48bebdfd14200ff2bf8d
Autor:
Wonseok Choi, Akiko Inoue, Byeonghak Lee, Jooyoung Lee, Eik List, Kazuhiko Minematsu, Yusuke Naito
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 4 (2020)
Tweakable block ciphers (TBCs) have proven highly useful to boost the security guarantees of authentication schemes. In 2017, Cogliati et al. proposed two MACs combining TBC and universal hash functions: a nonce-based MAC called NaT and a determinist
Externí odkaz:
https://doaj.org/article/67be29dbba1f4db7bf6217e7018c612c
Publikováno v:
Advances in Cryptology – EUROCRYPT 2023 ISBN: 9783031306334
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a7128ed5b0872dc84bd87854e85f5227
https://doi.org/10.1007/978-3-031-30634-1_18
https://doi.org/10.1007/978-3-031-30634-1_18
Autor:
Yusuke Naito, Jooyoung Lee, Akiko Inoue, Kazuhiko Minematsu, Eik List, Wonseok Choi, Byeonghak Lee
Publikováno v:
IACR Transactions on Symmetric Cryptology; Volume 2020, Issue 4; 39-70
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 4 (2020)
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 4 (2020)
Tweakable block ciphers (TBCs) have proven highly useful to boost the security guarantees of authentication schemes. In 2017, Cogliati et al. proposed two MACs combining TBC and universal hash functions: a nonce-based MAC called NaT and a determinist
Publikováno v:
Advances in Cryptology – EUROCRYPT 2022 ISBN: 9783031069437
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5b135d26120b2ca29d2d8180664f0ce1
https://doi.org/10.1007/978-3-031-06944-4_20
https://doi.org/10.1007/978-3-031-06944-4_20
Autor:
Jihoon Cho, Jincheol Ha, Seongkwang Kim, Byeonghak Lee, Joohee Lee, Jooyoung Lee, Dukjae Moon, Hyojin Yoon
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030920777
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6fcdab7b9e7b0c9d1c22cc1ba500dd8e
https://doi.org/10.1007/978-3-030-92078-4_22
https://doi.org/10.1007/978-3-030-92078-4_22
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030920777
Lecture Notes in Computer Science
Lecture Notes in Computer Science
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::007d57e47362809a23b2015b822edfcb
https://doi.org/10.1007/978-3-030-92078-4_14
https://doi.org/10.1007/978-3-030-92078-4_14
Publikováno v:
Advances in Cryptology – ASIACRYPT 2020 ISBN: 9783030648367
ASIACRYPT (1)
ASIACRYPT (1)
In this paper, we prove that the nonce-based enhanced hash-then-mask MAC (\(\mathsf {nEHtM}\)) is secure up to \(2^{\frac{3n}{4}}\) MAC queries and \(2^n\) verification queries (ignoring logarithmic factors) as long as the number of faulty queries \(
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ea5992649284f2534b6614e43bf691d9
https://doi.org/10.1007/978-3-030-64837-4_23
https://doi.org/10.1007/978-3-030-64837-4_23
Publikováno v:
Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457204
EUROCRYPT (1)
EUROCRYPT (1)
In this work, we study the security of deterministic MAC constructions with a double-block internal state, captured by the double-block hash-then-sum (\(\mathsf {DbHtS}\)) paradigm. Most \(\mathsf {DbHtS}\) constructions, including \(\mathsf {PolyMAC
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::985466bea98717d828f28c9596b1a0e8
https://doi.org/10.1007/978-3-030-45721-1_16
https://doi.org/10.1007/978-3-030-45721-1_16
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030345778
ASIACRYPT (1)
ASIACRYPT (1)
One of natural ways of constructing a pseudorandom function from a pseudorandom permutation is to simply truncate the output of the permutation. When n is the permutation size and m is the number of truncated bits, the resulting construction is known
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6e415c3cf9329b2cabc4e87174052523
https://doi.org/10.1007/978-3-030-34578-5_7
https://doi.org/10.1007/978-3-030-34578-5_7