Zobrazeno 1 - 10
of 120
pro vyhledávání: '"Rainer Steinwandt"'
Publikováno v:
IEEE Transactions on Quantum Engineering, Vol 1, Pp 1-12 (2020)
To quantify security levels in a postquantum scenario, it is common to use the quantum resources needed to attack the Advanced Encryption Standard (AES) as a reference value. Specifically, in the National Institute of Standards and Technology's ongoi
Externí odkaz:
https://doaj.org/article/3436a3b3f163489db081b044d0c6227f
Publikováno v:
Symmetry, Vol 12, Iss 2, p 197 (2020)
A group key establishment protocol is presented and proven secure in the common reference string mode. The protocol builds on a group-theoretic assumption, and a concrete example can be obtained with a decision Diffie−Hellman assumption. The protoc
Externí odkaz:
https://doaj.org/article/fd1a7ec5ba91491ea6826be5da17c371
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)
Side channel analysis and fault attacks are two powerful methods to analyze and break cryptographic implementations. At CHES 2011, Roche and Prouff applied secure multiparty computation to prevent side-channel attacks. While multiparty computation is
Externí odkaz:
https://doaj.org/article/f84c24aabdd34f838802b5a636e77782
Publikováno v:
Symmetry, Vol 11, Iss 11, p 1411 (2019)
The Data Encryption Standard Lightweight extension (DESL) is a lightweight block cipher which is very similar to DES, but unlike DES uses only a single S-box. This work demonstrates that this block cipher satisfies comparable algebraic properties to
Externí odkaz:
https://doaj.org/article/e20958bd437343c3aedb0c58e3cf9ed1
Publikováno v:
Entropy, Vol 21, Iss 9, p 872 (2019)
Traditionally, cryptographic protocols rely on mathematical assumptions and results to establish security guarantees. Quantum cryptography has demonstrated how physical properties of a communication channel can be leveraged in the design of cryptogra
Externí odkaz:
https://doaj.org/article/0eca92f5d4ae445ba3535f7d47c3c934
Publikováno v:
Cryptography, Vol 2, Iss 3, p 16 (2018)
In 2008, Doliskani et al. proposed an ElGamal-style encryption scheme using the symmetric group Sn as mathematical platform. In 2012, an improvement of the cryptosystem’s memory requirements was suggested by Othman. The proposal by Doliskani et al.
Externí odkaz:
https://doaj.org/article/227c9228d55a4001b5fecf2731f7e2f2
Publikováno v:
Informatica. :1-18
Publikováno v:
IEEE Transactions on Quantum Engineering, Vol 1, Pp 1-12 (2020)
To quantify security levels in a postquantum scenario, it is common to use the quantum resources needed to attack the Advanced Encryption Standard (AES) as a reference value. Specifically, in the National Institute of Standards and Technology's ongoi
Publikováno v:
International Journal of Applied Mathematics and Computer Science, Vol 29, Iss 4, Pp 797-815 (2019)
Volume & Issue: Volume 29 (2019) - Issue 4 (December 2019) - New Perspectives in Nonlinear and Intelligent Control (In Honor of Alexander P. Kurdyukov) (special section, pp. 629-712), Julio B. Clempner, Enso Ikonen, Alexander P. Kurdyukov (Eds.) Pass
Publikováno v:
Symmetry; Volume 12; Issue 2; Pages: 197
Symmetry, Vol 12, Iss 2, p 197 (2020)
Symmetry, Vol 12, Iss 2, p 197 (2020)
This article belongs to the Special Issue Interactions between Group Theory, Symmetry and Cryptology. A group key establishment protocol is presented and proven secure in the common reference string mode. The protocol builds on a group-theoretic assu