Zobrazeno 1 - 10
of 85
pro vyhledávání: '"Stefan Lucks"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 1 (2024)
A deterministic random bit generator (DRBG) generates pseudorandom bits from an unpredictable seed, i.e., a seed drawn from any random source with sufficient entropy. The current paper formalizes a security notion for a DRBG, in which an attacker may
Externí odkaz:
https://doaj.org/article/82c63e8fe54c484ba704d036bb752360
Autor:
Jannis Leuther, Stefan Lucks
Publikováno v:
Codes, Cryptology and Information Security ISBN: 9783031330162
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::38ccae04ea7f8c2e5181f433e94ab17c
https://doi.org/10.1007/978-3-031-33017-9_6
https://doi.org/10.1007/978-3-031-33017-9_6
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031293702
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bc6e69e8d18fe0c66298bd1b8e2b9cc0
https://doi.org/10.1007/978-3-031-29371-9_2
https://doi.org/10.1007/978-3-031-29371-9_2
Publikováno v:
Topics in Cryptology – CT-RSA 2022 ISBN: 9783030953119
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::55a2a10fc832367f436d0c3ed3f7a221
https://doi.org/10.1007/978-3-030-95312-6_21
https://doi.org/10.1007/978-3-030-95312-6_21
Publikováno v:
SP Workshops
When binary data are sent from one party to another one, the encoding of the data can be described as a “data serialisation” language (DaSeL). Many DaSeLs employ the “length-prefix” pattern for strings, containers and other data items of vari
Publikováno v:
Cryptography and Communications. 10:177-193
On-line ciphers are convenient building blocks for realizing efficient single- pass encryption. In particular, the trend to limit the consequences of nonce reuses rendered them popular in recent authenticated encryption schemes. While encryption sche
Publikováno v:
Computer Science Review. 22:13-26
An authenticated encryption scheme is a scheme which provides privacy and integrity by using a secret key. In 2013, CAESAR (the “Competition for Authenticated Encryption: Security, Applicability, and Robustness”) was co-founded by NIST and Dan Be
Publikováno v:
IEEE Symposium on Security and Privacy Workshops
When binary data are sent over a byte stream, the binary format sender and receiver are using is a "data serialization language", either explicitely specified, or implied by the implementations. Security is at risk when sender and receiver disagree o
Publikováno v:
NDSS
Publikováno v:
Secure IT Systems ISBN: 9783319702896
NordSec
NordSec
Leakage resilient cryptography wants to provide security against side channel attacks. In this paper, we present several issues of the \(\mathsf {RCB}\) block cipher mode, proposed by Agrawal et al. in [2]. \(\mathsf {RCB}\) is the first Leakage Resi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6a14c2247c89e853f5ee370817b754b7
https://doi.org/10.1007/978-3-319-70290-2_3
https://doi.org/10.1007/978-3-319-70290-2_3