Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Ronny Van Keer"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
In this paper, we present Xoodyak, a cryptographic primitive that can be used for hashing, encryption, MAC computation and authenticated encryption. Essentially, it is a duplex object extended with an interface that allows absorbing strings of arbitr
Externí odkaz:
https://doaj.org/article/fab89d3fc31649e58ee0e799c1880efc
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 1-38 (2017)
In this paper, we introduce Farfalle, a new permutation-based construction for building a pseudorandom function (PRF). The PRF takes as input a key and a sequence of arbitrary-length data strings, and returns an arbitrary-length output. It has a comp
Externí odkaz:
https://doaj.org/article/db77b5c42f964d2fb4ef9ec4cd10999a
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2018, Iss 4 (2018)
This paper presents Xoodoo, a 48-byte cryptographic permutation with excellent propagation properties. Its design approach is inspired by Keccak-p, while it is dimensioned like Gimli for efficiency on low-end processors. The structure consists of thr
Externí odkaz:
https://doaj.org/article/bcf02c1b37274dd28cfb91cc9480f965
Publikováno v:
Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
IACR Transactions on Symmetric Cryptology, 2020, S1, pp. 60-87
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
IACR Transactions on Symmetric Cryptology; Volume 2020, Special Issue 1 ; 60-87
IACR Transactions on Symmetric Cryptology, 2020, 60-87
IACR Transactions on Symmetric Cryptology, 2020, S1, pp. 60-87
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
IACR Transactions on Symmetric Cryptology; Volume 2020, Special Issue 1 ; 60-87
IACR Transactions on Symmetric Cryptology, 2020, 60-87
In this paper, we present Xoodyak, a cryptographic primitive that can be used for hashing, encryption, MAC computation and authenticated encryption. Essentially, it is a duplex object extended with an interface that allows absorbing strings of arbitr
Publikováno v:
Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229657
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::574e2224706edfa047b20e076d772ded
https://doi.org/10.1007/978-3-031-22966-4_19
https://doi.org/10.1007/978-3-031-22966-4_19
Autor:
Guido Bertoni, Joan Daemen, Ronny Van Keer, Michael J. Peeters, Gilles Van Assche, Benoît Viguier
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783319933863
We present KangarooTwelve, a fast and secure arbitrary output-length hash function aiming at a higher speed than the FIPS 202’s SHA-3 and SHAKE functions. While sharing many features with SHAKE128, like the cryptographic primitive, the sponge const
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d074a1e2ad9c07f9edfdd3917e1e774f
https://doi.org/10.1007/978-3-319-93387-0_21
https://doi.org/10.1007/978-3-319-93387-0_21