Zobrazeno 1 - 10
of 62
pro vyhledávání: '"Guido Bertoni"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 1-38 (2017)
In this paper, we introduce Farfalle, a new permutation-based construction for building a pseudorandom function (PRF). The PRF takes as input a key and a sequence of arbitrary-length data strings, and returns an arbitrary-length output. It has a comp
Externí odkaz:
https://doaj.org/article/db77b5c42f964d2fb4ef9ec4cd10999a
Autor:
Iliet Rodr��guez Garc��a, Estanque, Guido Bertoni, Rodr��guez, Eliana Gonz��lez, Klency Gonz��lez Hern��ndez
Ante las exigencias acad��micas en la educaci��n superior, la planificaci��n del tiempo dedicado al estudio resulta clave para una preparaci��n preprofesional de calidad. Este art��culo indaga c��mo eval��an los estudiante
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0a5d2854d6b1120579ac70a3c9c5188c
Autor:
Iliet Rodríguez García, Guido Bertoni Estanque, Eliana González Rodríguez, Klency González Hernández
Ante las exigencias académicas en la educación superior, la planificación del tiempo dedicado al estudio resulta clave para una preparación preprofesional de calidad. Este artículo indaga cómo evalúan los estudiantes de la Facultad de Psicolog
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::be4e91a29bc017119462659562780bd6
Publikováno v:
ACM Transactions on Design Automation of Electronic Systems. 23:1-17
Implementing a cryptographic circuit poses challenges not always acknowledged in the backing mathematical theory. One of them is the vulnerability against side-channel attacks . A side-channel attack is a procedure that uses information leaked by the
Publikováno v:
FDTC
This paper evaluates the effectiveness of exfiltrating a key from an AES primitive by injecting double transient faults into the digital circuit using two laser lights. We present some theoretical consideration on the effectiveness of this approach a
Publikováno v:
IEEE Transactions on Computers
This brief deals with the problem of mathematically formalizing hardware circuits' vulnerability to side-channel attacks. We investigate whether spectral analysis is a useful analytical tool for this purpose by building a mathematically sound theory
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e61740fc5c435646c76aa710894b5bbe
Autor:
Guido Bertoni, Joan Daemen, Ronny Van Keer, Michael J. Peeters, Gilles Van Assche, Benoît Viguier
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783319933863
We present KangarooTwelve, a fast and secure arbitrary output-length hash function aiming at a higher speed than the FIPS 202’s SHA-3 and SHAKE functions. While sharing many features with SHAKE128, like the cryptographic primitive, the sponge const
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d074a1e2ad9c07f9edfdd3917e1e774f
https://doi.org/10.1007/978-3-319-93387-0_21
https://doi.org/10.1007/978-3-319-93387-0_21
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319769523
CT-RSA
CT-RSA
Ed25519 is an instance of the Elliptic Curve based signature scheme EdDSA that was recently introduced to solve an inconvenience of the more established ECDSA. Namely, both schemes require the generation of a value (scalar of the ephemeral key pair)
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::72158d046559c67a1c2c5516ea0853ff
https://doi.org/10.1007/978-3-319-76953-0_1
https://doi.org/10.1007/978-3-319-76953-0_1
Publikováno v:
IEEE Transactions on Computers. 67:305-306
The papers in this special section focus on security in computer architectures. Computer architectures are profoundly affected by a new security landscape, caused by the dramatic evolution of information technology over the past decade. First, secure
Publikováno v:
International Journal of Information Security. 13:335-353
Hash functions are usually composed of a mode of operation on top of a concrete primitive with fixed input-length and fixed output-length, such as a block cipher or a permutation. In practice, the mode is often sequential, although parallel (or tree)