Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Michaël Peeters"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
In this paper, we present Xoodyak, a cryptographic primitive that can be used for hashing, encryption, MAC computation and authenticated encryption. Essentially, it is a duplex object extended with an interface that allows absorbing strings of arbitr
Externí odkaz:
https://doaj.org/article/fab89d3fc31649e58ee0e799c1880efc
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 1-38 (2017)
In this paper, we introduce Farfalle, a new permutation-based construction for building a pseudorandom function (PRF). The PRF takes as input a key and a sequence of arbitrary-length data strings, and returns an arbitrary-length output. It has a comp
Externí odkaz:
https://doaj.org/article/db77b5c42f964d2fb4ef9ec4cd10999a
Investors are currently obliged to take ESG (Environment, Social, Governance) issues into consideration as part of their fiduciary duty. As such, it becomes increasingly important to identify sustainable investments that hold financial value as well.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a3ca09e728c9c0425e740e7a6248228e
Publikováno v:
Sustainability
Sustainability, Vol 13, Iss 3239, p 3239 (2021)
Sustainability, Vol 13, Iss 3239, p 3239 (2021)
Investors are currently obliged to take environment, social, and governance (ESG) issues into consideration as part of their fiduciary duty. As such, it becomes increasingly important to identify sustainable investments that also hold financial value
Publikováno v:
INNOVATIONS in Pharmacy, Vol 15, Iss 2 (2024)
Objective: Leadership discussion, including leadership development programs, is common. However, discussion of followership as a component of leadership seems less frequently discussed. With a focus on leadership and followership, this investigation
Externí odkaz:
https://doaj.org/article/01fdbac8d77545cc89e04c56f94f2ad0
Publikováno v:
International Journal of Information Security. 13:335-353
Hash functions are usually composed of a mode of operation on top of a concrete primitive with fixed input-length and fixed output-length, such as a block cipher or a permutation. In practice, the mode is often sequential, although parallel (or tree)
Autor:
Tatjana Locus, Ellen Lambrecht, Sophie Lamoral, Sjarlotte Willems, Steven Van Gucht, Thomas Vanwolleghem, Michael Peeters
Publikováno v:
Veterinary Sciences, Vol 10, Iss 12, p 676 (2023)
Hepatitis E virus is a prominent cause of viral hepatitis worldwide. In Western countries, most infections are asymptomatic. However, acute self-limiting hepatitis and chronic cases in immunocompromised individuals can occur. Studying HEV is challeng
Externí odkaz:
https://doaj.org/article/aec7b6a236464b5da1506d7c4fb49edd
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783319075358
ACNS
ACNS
We propose a flexible, fairly general, coding for tree hash modes. The coding does not define a tree hash mode, but instead specifies a way to format the message blocks and chaining values into inputs to the underlying function for any topology, incl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b7f9e4f9aae2aef178aa9b108f530c5c
https://doi.org/10.1007/978-3-319-07536-5_14
https://doi.org/10.1007/978-3-319-07536-5_14
Publikováno v:
Advances in Cryptology – EUROCRYPT 2013 ISBN: 9783642383472
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f66cf5148d6acf9d450ed6ce4a5e7f93
https://doi.org/10.1007/978-3-642-38348-9_19
https://doi.org/10.1007/978-3-642-38348-9_19
Publikováno v:
Selected Areas in Cryptography ISBN: 9783642284953
Selected Areas in Cryptography
Selected Areas in Cryptography
This paper proposes a novel construction, called duplex, closely related to the sponge construction, that accepts message blocks to be hashed and---at no extra cost---provides digests on the input blocks received so far. It can be proven equivalent t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0c3d799b6189ed53b12e047e056700b6
https://doi.org/10.1007/978-3-642-28496-0_19
https://doi.org/10.1007/978-3-642-28496-0_19