Zobrazeno 1 - 10
of 24
pro vyhledávání: '"permutation-based cryptography"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 4 (2023)
Determining bounds on the differential probability of differential trails and the squared correlation contribution of linear trails forms an important part of the security evaluation of a permutation. For Xoodoo, such bounds were proven using the tra
Externí odkaz:
https://doaj.org/article/ef42847eb24b4b67a0a8344310c4f510
Autor:
Christoph Dobraunig, Bart Mennink
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 4 (2020)
Generic attacks are a vital ingredient in the evaluation of the tightness of security proofs. In this paper, we evaluate the tightness of the suffix keyed sponge (SuKS) bound. As its name suggests, SuKS is a sponge-based construction that absorbs the
Externí odkaz:
https://doaj.org/article/3920267f8ce549a9975228cf80d5c31d
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
In this paper, we present Xoodyak, a cryptographic primitive that can be used for hashing, encryption, MAC computation and authenticated encryption. Essentially, it is a duplex object extended with an interface that allows absorbing strings of arbitr
Externí odkaz:
https://doaj.org/article/fab89d3fc31649e58ee0e799c1880efc
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 1-38 (2017)
In this paper, we introduce Farfalle, a new permutation-based construction for building a pseudorandom function (PRF). The PRF takes as input a key and a sequence of arbitrary-length data strings, and returns an arbitrary-length output. It has a comp
Externí odkaz:
https://doaj.org/article/db77b5c42f964d2fb4ef9ec4cd10999a
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2018, Iss 4 (2018)
This paper presents Xoodoo, a 48-byte cryptographic permutation with excellent propagation properties. Its design approach is inspired by Keccak-p, while it is dimensioned like Gimli for efficiency on low-end processors. The structure consists of thr
Externí odkaz:
https://doaj.org/article/bcf02c1b37274dd28cfb91cc9480f965
Autor:
Alsahli, Malik Ruzayq M, Borgognoni, Alex, Cardoso Dos Santos, Luan, Cheng, Hao, Franck, Christian, Groszschädl, Johann
The U.S. National Institute of Standards and Technology is currently undertaking a process to evaluate and eventually standardize one or more "lightweight" algorithms for authenticated encryption and hashing that are suitable for resource-restricted
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2658::d225569b885d4c2f70b50ed6643d593f
http://orbilu.uni.lu/handle/10993/54270
http://orbilu.uni.lu/handle/10993/54270
Publikováno v:
Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
IACR Transactions on Symmetric Cryptology, 2020, S1, pp. 60-87
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
IACR Transactions on Symmetric Cryptology; Volume 2020, Special Issue 1 ; 60-87
IACR Transactions on Symmetric Cryptology, 2020, 60-87
IACR Transactions on Symmetric Cryptology, 2020, S1, pp. 60-87
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
IACR Transactions on Symmetric Cryptology; Volume 2020, Special Issue 1 ; 60-87
IACR Transactions on Symmetric Cryptology, 2020, 60-87
In this paper, we present Xoodyak, a cryptographic primitive that can be used for hashing, encryption, MAC computation and authenticated encryption. Essentially, it is a duplex object extended with an interface that allows absorbing strings of arbitr
Permutation-based symmetric cryptography has become increasingly popular over the past ten years, especially in the lightweight domain. More than half of the 32 second-round candidates of NIST's lightweight cryptography standardization project are pe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2658::08542c99ebc51c266ae546fc3ab71ce8
http://orbilu.uni.lu/handle/10993/52367
http://orbilu.uni.lu/handle/10993/52367
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.