Zobrazeno 1 - 10
of 150
pro vyhledávání: '"Dobraunig"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 2 (2023)
Universal hash functions play a prominent role in the design of message authentication codes and the like. Whereas it is known how to build highly efficient sequential universal hash functions, parallel non-algebraic universal hash function designs a
Externí odkaz:
https://doaj.org/article/0400550f17104f1fa2403972fe31a35d
Autor:
Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 3 (2023)
The idea of hybrid homomorphic encryption (HHE) is to drastically reduce bandwidth requirements when using homomorphic encryption (HE) at the cost of more expensive computations in the encrypted domain. To this end, various dedicated schemes for symm
Externí odkaz:
https://doaj.org/article/51b1c8bcf7f64e458eeb1ea842a01bbc
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 1 (2022)
Recently, a memory safety concept called Cryptographic Capability Computing (C3) has been proposed. C3 is the first memory safety mechanism that works without requiring extra storage for metadata and hence, has the potential to significantly enhance
Externí odkaz:
https://doaj.org/article/00cfa76d954748be849216d2e395934c
Publikováno v:
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 1, pp. 326-368
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 326-368
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 326-368
Recently, a memory safety concept called Cryptographic Capability Computing (C3) has been proposed. C3 is the first memory safety mechanism that works without requiring extra storage for metadata and hence, has the potential to significantly enhance
Autor:
Christoph Dobraunig, Bart Mennink
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 4 (2020)
Generic attacks are a vital ingredient in the evaluation of the tightness of security proofs. In this paper, we evaluate the tightness of the suffix keyed sponge (SuKS) bound. As its name suggests, SuKS is a sponge-based construction that absorbs the
Externí odkaz:
https://doaj.org/article/3920267f8ce549a9975228cf80d5c31d
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
With the trend to connect more and more devices to the Internet, authenticated encryption has become a major backbone in securing the communication, not only between these devices and servers, but also the direct communication among these devices. Mo
Externí odkaz:
https://doaj.org/article/f119005102604e94b6371426df41f51e
Autor:
Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, Thomas Unterluggauer
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
We specify Isap v2.0, a lightweight permutation-based authenticated encryption algorithm that is designed to ease protection against side-channel and fault attacks. This design is an improved version of the previously published Isap v1.0, and offers
Externí odkaz:
https://doaj.org/article/3f5cddb660104aee822aec0c5be79e93
Autor:
Joan Daemen, Christoph Dobraunig, Maria Eichsleder, Hannes Gross, Florian Mendel, Robert Primas
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 3 (2020)
Statistical Ineffective Fault Attacks (SIFA) pose a threat for many practical implementations of symmetric primitives. Countermeasures against both power analysis and fault attacks typically do not prevent straightforward SIFA attacks, which require
Externí odkaz:
https://doaj.org/article/182271106f154c91bf1403cb6429d556
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 1 (2020)
Cryptographic competitions, like the ongoing NIST call for lightweight cryptography, always provide a thriving research environment, where new interesting ideas are proposed and new cryptographic insights are made. One proposal for this NIST call tha
Externí odkaz:
https://doaj.org/article/1e3e45477da6480db6b235db158e526f
Autor:
Christoph Dobraunig, Bart Mennink
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2019, Iss 4 (2020)
We formalize and analyze the general suffix keyed sponge construction, a pseudorandom function built on top of a cryptographic permutation. The construction hashes its data using the (keyless) sponge construction, transforms part of the state using t
Externí odkaz:
https://doaj.org/article/d9fa5939d3764caa804f086273c3d22a