Zobrazeno 1 - 10
of 87
pro vyhledávání: '"Christian Rechberger"'
Autor:
Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 3 (2024)
Hash functions are a crucial component in incrementally verifiable computation (IVC) protocols and applications. Among those, recursive SNARKs and folding schemes require hash functions to be both fast in native CPU computations and compact in algebr
Externí odkaz:
https://doaj.org/article/8a0edbe6b0d944389a545785d4da71f3
Autor:
Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 3 (2023)
The idea of hybrid homomorphic encryption (HHE) is to drastically reduce bandwidth requirements when using homomorphic encryption (HE) at the cost of more expensive computations in the encrypted domain. To this end, various dedicated schemes for symm
Externí odkaz:
https://doaj.org/article/51b1c8bcf7f64e458eeb1ea842a01bbc
Autor:
Carlos Cid, Lorenzo Grassi, Aldo Gunsing, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 1 (2022)
We consider SPN schemes, i.e., schemes whose non-linear layer is defined as the parallel application of t ≥ 1 independent S-Boxes over F2n and whose linear layer is defined by the multiplication with a (n · t) × (n · t) matrix over F2. Even if t
Externí odkaz:
https://doaj.org/article/e41abd46894f4f1bbf53ecffbe23289e
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 2 (2021)
Designing cryptographic permutations and block ciphers using a substitutionpermutation network (SPN) approach where the nonlinear part does not cover the entire state has recently gained attention due to favorable implementation characteristics in va
Externí odkaz:
https://doaj.org/article/201d4c6762724c01b64adc24bc75f02c
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 192-225 (2017)
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such
Externí odkaz:
https://doaj.org/article/1bb869a0e2dd44f593c731ebd3be9400
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 1-29 (2017)
Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs. However, various application
Externí odkaz:
https://doaj.org/article/9bf047de7c9740988f0e95607a029fe2
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2018, Iss 3 (2018)
LowMC is a family of block ciphers designed for a low multiplicative complexity. The specification allows a large variety of instantiations, differing in block size, key size, number of S-boxes applied per round and allowed data complexity. The numbe
Externí odkaz:
https://doaj.org/article/37e6004cb015402482db3226b600f61c
Publikováno v:
Landtechnik, Vol 69, Iss 3 (2014)
In dieser Studie wurde der Einsatz von passiver Bilddatenerfassung für die Generierung von 3-D-Modellen der Ackeroberfläche mittels Stereovision untersucht. Hierfür wurde ein Stereo- Vision-System (SVS) verwendet, welches an einer elektrisch anget
Externí odkaz:
https://doaj.org/article/5304b93e5dfe4658bdcd486f18314001
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Autor:
Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch
Publikováno v:
Yin, H. (ed.), CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA November 7-11, 2022, pp. 1323-1335
Contains fulltext : 287472.pdf (Publisher’s version ) (Open Access) CCS '22
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::53d2f3a0de7c19f8ab6cca12393b3fe9
https://repository.ubn.ru.nl/handle/2066/287472
https://repository.ubn.ru.nl/handle/2066/287472