搜索结果: 1-15 共查到“军事学 sponge”相关记录20条 . 查询时间(0.125 秒)
Security of the Suffix Keyed Sponge
suffix MAC sponge SuKS
font style='font-size:12px;'>
2019/5/28
We formalize and analyze the general suffix keyed sponge construction, a pseudorandom function built on top of a cryptographic permutation. The construction hashes its data using the (keyless) sponge ...
Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge
Authenticated Encryption Duplex Construction Leakage-Resilience
font style='font-size:12px;'>
2019/3/1
Authenticated Encryption (AE) has become the de facto standard for encryption in modern protocols, and the ubiquitous deployment of small connected devices naturally calls for the availability of ligh...
Post-quantum security of the sponge construction
Post-quantum cryptography hash functions Sponge construction
font style='font-size:12px;'>
2017/8/16
We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengtheni...
sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives
Lightweight cryptography Cryptographic permutation Simeck block cipher
font style='font-size:12px;'>
2017/8/10
In this paper, we propose a family of lightweight cryptographic permutations called sLiSCP, with the sole aim to provide a realistic minimal design}that suits a variety of lightweight device applicati...
Collapsing sponges: Post-quantum security of the sponge construction
quantum cryptography hash functions
font style='font-size:12px;'>
2017/3/31
We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengtheni...
Conditional Cube Attack on Reduced-Round Keccak Sponge Function
Keccak-MAC Keyak cube tester
font style='font-size:12px;'>
2016/12/10
The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest. Recently, some attention has been paid to the analysis of keyed modes of Keccak sponge function. As a notable...
A Robust and Sponge-Like PRNG with Improved Efficiency
sponge pseudo-random number generator (PRNG) Patarin's H-coefficient technique
font style='font-size:12px;'>
2016/12/9
Ever since Keccak won the SHA3 competition, sponge-based
constructions are being suggested for many different applications, including
pseudo-random number generators (PRNGs). Sponges are very
desir...
Bash-f: another LRX sponge function
hash algorithm sponge construction LRX
font style='font-size:12px;'>
2016/6/7
We present the Bash family of hashing algorithms based on the sponge paradigm.
A core element of this family is the Bash-f sponge function which refers to the LRX (LogicalRotation-Xor)
class of symm...
Provably Robust Sponge-Based PRNGs and KDFs
PRNGs sponges SHA-3
font style='font-size:12px;'>
2016/2/22
We study the problem of devising provably secure PRNGs
with input based on the sponge paradigm. Such constructions are very
appealing, as efficient software/hardware implementations of SHA-3 can
ea...
Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function
Keccak SHA-3 sponge function
font style='font-size:12px;'>
2016/1/23
In this paper we mount the cube attack on the Keccak sponge function. The cube attack, formally introduced in 2008, is an algebraic technique applicable to cryptographic primitives whose output can ...
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
Authenticated encryption CAESAR Ascon
font style='font-size:12px;'>
2016/1/9
The Sponge function is known to achieve 2^{c/2} security, where c is its capacity. This bound was carried over to keyed variants of the function, such as SpongeWrap, to achieve a min{2^{c/2},2^kappa} ...
Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function
Keccak SHA-3 sponge function
font style='font-size:12px;'>
2016/1/7
In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak) against algebraic attacks. This analysis covers a wide range of key recovery, MAC forgery and other types of ...
SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON
SCA Lightweight Cryptography Sponge functions
font style='font-size:12px;'>
2016/1/3
PHOTON is a lightweight hash function which was proposed
by Guo et al. in CRYPTO 2011. This is used in low-resource ubiquitous
computing devices such as RFID tags, wireless sensor nodes, smart cards...
Sponge based CCA2 secure asymmetric encryption for arbitrary length message
OAEP Sponge function public key encryption
font style='font-size:12px;'>
2015/12/31
OAEP and other similar schemes proven secure in Random-Oracle Model require one or
more hash functions with output size larger than those of standard hash functions. In this
paper, we show that by u...
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
Sponge construction Duplex construction full-state absorption
font style='font-size:12px;'>
2015/12/30
We provide a security analysis for full-state keyed Sponge and full-state Duplex
constructions. Our results can be used for making a large class of Sponge-based authenticated
encryption schemes more...