Zobrazeno 1 - 10
of 42
pro vyhledávání: '"Gilles Van Assche"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 4 (2023)
Determining bounds on the differential probability of differential trails and the squared correlation contribution of linear trails forms an important part of the security evaluation of a permutation. For Xoodoo, such bounds were proven using the tra
Externí odkaz:
https://doaj.org/article/ef42847eb24b4b67a0a8344310c4f510
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
In this paper, we present Xoodyak, a cryptographic primitive that can be used for hashing, encryption, MAC computation and authenticated encryption. Essentially, it is a duplex object extended with an interface that allows absorbing strings of arbitr
Externí odkaz:
https://doaj.org/article/fab89d3fc31649e58ee0e799c1880efc
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 1-38 (2017)
In this paper, we introduce Farfalle, a new permutation-based construction for building a pseudorandom function (PRF). The PRF takes as input a key and a sequence of arbitrary-length data strings, and returns an arbitrary-length output. It has a comp
Externí odkaz:
https://doaj.org/article/db77b5c42f964d2fb4ef9ec4cd10999a
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 329-357 (2017)
We present new techniques to efficiently scan the space of high-probability differential trails in bit-oriented ciphers. Differential trails consist in sequences of state patterns that we represent as ordered lists of basic components in order to arr
Externí odkaz:
https://doaj.org/article/892027e3e3914214a981dd2945b36c2f
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2018, Iss 4 (2018)
This paper presents Xoodoo, a 48-byte cryptographic permutation with excellent propagation properties. Its design approach is inspired by Keccak-p, while it is dimensioned like Gimli for efficiency on low-end processors. The structure consists of thr
Externí odkaz:
https://doaj.org/article/bcf02c1b37274dd28cfb91cc9480f965
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2018, Iss 4 (2018)
Cryptographic hashing modes come in many flavors, including Merkle-Damgård with various types of strengthening, Merkle trees, and sponge functions. As underlying primitives, these functions use arbitrary functions, permutations, or block ciphers. In
Externí odkaz:
https://doaj.org/article/3614b5f73538425298e39c96c1a0a477
Publikováno v:
Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
IACR Transactions on Symmetric Cryptology, 2020, S1, pp. 60-87
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
IACR Transactions on Symmetric Cryptology; Volume 2020, Special Issue 1 ; 60-87
IACR Transactions on Symmetric Cryptology, 2020, 60-87
IACR Transactions on Symmetric Cryptology, 2020, S1, pp. 60-87
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
IACR Transactions on Symmetric Cryptology; Volume 2020, Special Issue 1 ; 60-87
IACR Transactions on Symmetric Cryptology, 2020, 60-87
In this paper, we present Xoodyak, a cryptographic primitive that can be used for hashing, encryption, MAC computation and authenticated encryption. Essentially, it is a duplex object extended with an interface that allows absorbing strings of arbitr
Publikováno v:
Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229657
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::574e2224706edfa047b20e076d772ded
https://doi.org/10.1007/978-3-031-22966-4_19
https://doi.org/10.1007/978-3-031-22966-4_19
Publikováno v:
Advances in Cryptology-CRYPTO 2021
Annual International Cryptology Conference-CRYPTO 2021
Annual International Cryptology Conference-CRYPTO 2021, Aug 2021, Virtual, United States. pp.337-367, ⟨10.1007/978-3-030-84252-9_12⟩
Malkin, T. (ed.), Advances in Cryptology – CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part III, pp. 337-367
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842512
CRYPTO (3)
Annual International Cryptology Conference-CRYPTO 2021
Annual International Cryptology Conference-CRYPTO 2021, Aug 2021, Virtual, United States. pp.337-367, ⟨10.1007/978-3-030-84252-9_12⟩
Malkin, T. (ed.), Advances in Cryptology – CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part III, pp. 337-367
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842512
CRYPTO (3)
International audience; Designing a block cipher or cryptographic permutation can be approached in many different ways. One such approach, popularized by AES, consists in grouping the bits along the S-box boundaries, e.g., in bytes, and in consistent
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::58d89709cb80c27400186b4d17dae78a
https://hal.archives-ouvertes.fr/hal-03337690
https://hal.archives-ouvertes.fr/hal-03337690
Autor:
Guido Bertoni, Joan Daemen, Ronny Van Keer, Michael J. Peeters, Gilles Van Assche, Benoît Viguier
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783319933863
We present KangarooTwelve, a fast and secure arbitrary output-length hash function aiming at a higher speed than the FIPS 202’s SHA-3 and SHAKE functions. While sharing many features with SHAKE128, like the cryptographic primitive, the sponge const
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d074a1e2ad9c07f9edfdd3917e1e774f
https://doi.org/10.1007/978-3-319-93387-0_21
https://doi.org/10.1007/978-3-319-93387-0_21