Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Damian Vizár"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 3 (2021)
A multi-forkcipher (MFC) is a generalization of the forkcipher (FC) primitive introduced by Andreeva et al. at ASIACRYPT’19. An MFC is a tweakable cipher that computes s output blocks for a single input block, with s arbitrary but fixed. We define
Externí odkaz:
https://doaj.org/article/feb215e729a54757b5fc9cd80e0f53bf
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 2 (2021)
The currently ongoing NIST LWC project aims at identifying new standardization targets for lightweight authenticated encryption with associated data (AEAD) and (optionally) lightweight cryptographic hashing. NIST has deemed it important for performan
Externí odkaz:
https://doaj.org/article/b62aa0bfb417458db13a037313646341
Autor:
Guillaume Endignoux, Damian Vizár
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 125-144 (2017)
Real-world applications of authenticated encryption often require the encryption to be computable online, e.g. to compute the ith block of ciphertext after having processed the first i blocks of plaintext. A significant line of research was dedicated
Externí odkaz:
https://doaj.org/article/97c08c7de83f4e789a7b3065f512ce9d
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 3 (2021)
IACR Transactions on Symmetric Cryptology; Volume 2021, Issue 3; 1-35
IACR Transactions on Symmetric Cryptology; Volume 2021, Issue 3; 1-35
A multi-forkcipher (MFC) is a generalization of the forkcipher (FC) primitive introduced by Andreeva et al. at ASIACRYPT’19. An MFC is a tweakable cipher that computes s output blocks for a single input block, with s arbitrary but fixed. We define
Autor:
Serge Vaudenay, Damian Vizár
Publikováno v:
Tatra Mountains Mathematical Publications. 73:163-178
Fully homomorphic encryption (FHE) has been among the most popular research topics of the last decade. While the bootstrapping-based, public key cryptosystems that follow Gentry’s original design are getting more and more efficient, their performan
Publikováno v:
Selected Areas in Cryptography ISBN: 9783030816513
SAC
SAC
ForkAE is a NIST lightweight cryptography candidate that uses the forkcipher primitive in two modes of operation – SAEF and PAEF – optimized for authenticated encryption of the shortest messages. SAEF is a sequential and online AEAD that minimize
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::85cd1bf7b2918122309c4e6bf2614860
https://doi.org/10.1007/978-3-030-81652-0_20
https://doi.org/10.1007/978-3-030-81652-0_20
Autor:
Reza Reyhanitabar, Antoon Purnal, Elena Andreeva, Arnab Roy, Virginie Lallemand, Damian Vizár
Publikováno v:
ASIACRYPT 2019-25th Annual International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2019-25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2019, Kobe, Japan. pp.153-182, ⟨10.1007/978-3-030-34621-8_6⟩
Advances in Cryptology – ASIACRYPT 2019-25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II
Lecture Notes in Computer Science ISBN: 9783030346201
ASIACRYPT (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2019
ASIACRYPT 2019-25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Dec 2019, Kobe, Japan. pp.153-182, ⟨10.1007/978-3-030-34621-8_6⟩
Advances in Cryptology – ASIACRYPT 2019-25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II
Lecture Notes in Computer Science ISBN: 9783030346201
ASIACRYPT (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2019
Highly efficient encryption and authentication of short messages is an essential requirement for enabling security in constrained scenarios such as the CAN FD in automotive systems (max. message size 64 bytes), massive IoT, critical communication dom
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5947de08c9027c84428a0c2189a1909c
https://hal.inria.fr/hal-02388234/file/2019-1004_.pdf
https://hal.inria.fr/hal-02388234/file/2019-1004_.pdf
Autor:
Damian Vizár
Publikováno v:
Tatra Mountains Mathematical Publications. 67:167-190
Ensuring confidentiality and integrity of communication remains among the most important goals of cryptography. The notion of authenticated encryption marries these two security goals in a single symmetric-key, cryptographic primitive. A lot of effor
Autor:
Serge Vaudenay, Damian Vizár
Publikováno v:
Studia Scientiarum Mathematicarum Hungarica. 52:288-306
Since Gentry’s breakthrough result was introduced in the year 2009, the homomorphic encryption has become a very popular topic. The main contribution of Gentry’s thesis [5] was, that it has proven, that it actually is possible to design a fully h
Publikováno v:
SIACRYPT 2016: Advances in Cryptology – ASIACRYPT 2016
Advances in Cryptology – ASIACRYPT 2016 ISBN: 9783662538869
ASIACRYPT (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2016
Advances in Cryptology – ASIACRYPT 2016 ISBN: 9783662538869
ASIACRYPT (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2016
In conventional authenticated-encryption (AE) schemes, the ciphertext expansion, a.k.a. stretch or tag length, is a constant or a parameter of the scheme that must be fixed per key. However, using variable-length tags per key can be desirable in prac