-
1
-
-
78049351742
-
Quark: A lightweight hash
-
Mangard and Standaert
-
Aumasson, J.-P., Henzen, L., Meier, W., Naya-Plasencia, M.: Quark: A lightweight hash. In: Mangard and Standaert [20], pp. 1-15
-
LNCS
, pp. 1-15
-
-
Aumasson, J.-P.1
Henzen, L.2
Meier, W.3
Naya-Plasencia, M.4
-
2
-
-
84937407719
-
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
-
Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
-
Bellare, M., Namprempre, C.: Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 531-545. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
4
-
-
18844420431
-
Forward-security in private-key cryptography
-
ePrint Archive, Report 2001/035
-
Bellare, M., Yee, B.: Forward-security in private-key cryptography. Cryptology ePrint Archive, Report 2001/035 (2001), http://eprint.iacr.org/
-
(2001)
Cryptology
-
-
Bellare, M.1
Yee, B.2
-
5
-
-
51849150617
-
Sponge functions
-
public comment to from
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge functions. In: Ecrypt Hash Workshop (May 2007), public comment to NIST, from http://www.csrc.nist.gov/pki/HashWorkshop/ Public Comments/2007 May.html
-
Ecrypt Hash Workshop (May 2007)
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
6
-
-
44449147491
-
On the Indifferentiability of the Sponge Construction
-
Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: On the Indifferentiability of the Sponge Construction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 181-197. Springer, Heidelberg (2008), http://sponge.noekeon.org/
-
(2008)
LNCS
, vol.4965
, pp. 181-197
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
7
-
-
78049328962
-
Sponge-based pseudorandom number generators
-
Mangard and Standaert
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge-based pseudorandom number generators. In: Mangard and Standaert [20], pp. 33-47
-
LNCS
, pp. 33-47
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
8
-
-
84857764721
-
Duplexing the sponge: Singlepass authenticated encryption and other applications
-
ePrint Archive, Report 2011/499
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the sponge: singlepass authenticated encryption and other applications. Cryptology ePrint Archive, Report 2011/499 (2011), http://eprint.iacr.org/
-
(2011)
Cryptology
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
9
-
-
84916616012
-
On the security of the keyed sponge construction
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: On the security of the keyed sponge construction. In: Symmetric Key EncryptionWorkshop (SKEW) (February 2011)
-
Symmetric Key EncryptionWorkshop (SKEW) (February 2011)
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
10
-
-
84855354856
-
-
January
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The keccak reference (January 2011), http://keccak.noekeon.org/
-
(2011)
The Keccak Reference
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
11
-
-
77954728697
-
-
FSE 2007. Springer, Heidelberg
-
Biryukov, A. (ed.): FSE 2007. LNCS, vol. 4593. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4593
-
-
Biryukov, A.1
-
12
-
-
80053502266
-
Spongent: A Lightweight Hash Function
-
Preneel, B., Takagi, T. (eds.) CHES 2011. Springer, Heidelberg
-
Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varici, K., Verbauwhede, I.: spongent: A Lightweight Hash Function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312-325. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6917
, pp. 312-325
-
-
Bogdanov, A.1
Knežević, M.2
Leander, G.3
Toz, D.4
Varici, K.5
Verbauwhede, I.6
-
13
-
-
84947295950
-
A Practice-Oriented Treatment of Pseudorandom Number Generators
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Desai, A., Hevia, A., Yin, Y.L.: A Practice-Oriented Treatment of Pseudorandom Number Generators. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 368-383. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 368-383
-
-
Desai, A.1
Hevia, A.2
Yin, Y.L.3
-
14
-
-
84855360210
-
Request for review of key wrap algorithms
-
ePrint Archive, Report 2004/340
-
Dworkin, M.: Request for review of key wrap algorithms. Cryptology ePrint Archive, Report 2004/340 (2004), http://eprint.iacr.org/
-
(2004)
Cryptology
-
-
Dworkin, M.1
-
15
-
-
84889706985
-
ECRYPT Network of excellence
-
ECRYPT Network of excellence, The SHA-3 Zoo (2011), http://ehash.iaik. tugraz.at/index.php/The-SHA-3-Zoo
-
(2011)
The SHA-3 Zoo
-
-
-
16
-
-
0242571721
-
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive
-
Johansson, T. (ed.) FSE 2003. Springer, Heidelberg
-
Ferguson, N.,Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 330-346. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2887
, pp. 330-346
-
-
Ferguson, N.1
Whiting, D.2
Schneier, B.3
Kelsey, J.4
Lucks, S.5
Kohno, T.6
-
17
-
-
58349093205
-
Slide Attacks on a Class of Hash Functions
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Gorski, M., Lucks, S., Peyrin, T.: Slide Attacks on a Class of Hash Functions. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 143-160. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 143-160
-
-
Gorski, M.1
Lucks, S.2
Peyrin, T.3
-
18
-
-
80051991385
-
The PHOTON Family of Lightweight Hash Functions
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
Guo, J., Peyrin, T., Poschmann, A.: The PHOTON Family of Lightweight Hash Functions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 222-239. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 222-239
-
-
Guo, J.1
Peyrin, T.2
Poschmann, A.3
-
19
-
-
38149002857
-
The Grindahl hash functions
-
Biryukov
-
Knudsen, L., Rechberger, C., Thomsen, S.: The Grindahl hash functions. In: Biryukov [11], pp. 39-57
-
LNCS
, pp. 39-57
-
-
Knudsen, L.1
Rechberger, C.2
Thomsen, S.3
-
20
-
-
79960079027
-
-
CHES 2010. Springer, Heidelberg
-
Mangard, S., Standaert, F.-X. (eds.): CHES 2010. LNCS, vol. 6225. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6225
-
-
Mangard, S.1
Standaert, F.-X.2
-
21
-
-
35048817517
-
Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology
-
Naor, M. (ed.) TCC 2004. Springer, Heidelberg
-
Maurer, U., Renner, R., Holenstein, C.: Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 21-39. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2951
, pp. 21-39
-
-
Maurer, U.1
Renner, R.2
Holenstein, C.3
-
22
-
-
26444613466
-
Differential attacks against the Helix stream cipher
-
Roy and Meier
-
Muller, F.: Differential attacks against the Helix stream cipher. In: Roy and Meier [30], pp. 94-108
-
LNCS
, pp. 94-108
-
-
Muller, F.1
-
24
-
-
26444511997
-
Solving systems of differential equations of addition
-
Information Security and Privacy: 10th Australasian Conference, ACISP 2005. Proceedings
-
Paul, S., Preneel, B.: Solving Systems of Differential Equations of Addition. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 75-88. Springer, Heidelberg (2005) (Pubitemid 41431772)
-
(2005)
Lecture Notes in Computer Science
, vol.3574
, pp. 75-88
-
-
Paul, S.1
Preneel, B.2
-
25
-
-
79958012441
-
Careful with Composition: Limitations of the Indifferentiability Framework
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Ristenpart, T., Shacham, H., Shrimpton, T.: Careful with Composition: Limitations of the Indifferentiability Framework. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 487-506. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 487-506
-
-
Ristenpart, T.1
Shacham, H.2
Shrimpton, T.3
-
27
-
-
26444532494
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
Rogaway, P., Bellare, M., Black, J.: OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Trans. Inf. Syst. Secur. 6(3), 365-403 (2003)
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.3
, pp. 365-403
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
-
28
-
-
0035750947
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
ACM, New York
-
Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A block-cipher mode of operation for efficient authenticated encryption. In: CCS 2001: Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 196-205. ACM, New York (2001)
-
(2001)
CCS 2001: Proceedings of the 8th ACM Conference on Computer and Communications Security
, pp. 196-205
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
-
29
-
-
33746068613
-
A provable-security treatment of the key-wrap problem
-
DOI 10.1007/11761679-23, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Rogaway, P., Shrimpton, T.: A Provable-Security Treatment of the Key- Wrap Problem. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 373-390. Springer, Heidelberg (2006) (Pubitemid 44072251)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004 LNCS
, pp. 373-390
-
-
Rogaway, P.1
Shrimpton, T.2
-
30
-
-
84857765119
-
-
FSE 2004. Springer, Heidelberg
-
Roy, B., Meier, W. (eds.): FSE 2004. LNCS, vol. 3017. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3017
-
-
Roy, B.1
Meier, W.2
-
31
-
-
33746331948
-
Fast encryption and authentication in a single cryptographic primitive
-
Whiting, D., Schneier, B., Lucks, S., Muller, F.: Fast encryption and authentication in a single cryptographic primitive, ECRYPT Stream Cipher Project Report 2005/027 (2005), http://www.ecrypt.eu.org/stream/phelixp2.html
-
(2005)
ECRYPT Stream Cipher Project Report 2005/027
-
-
Whiting, D.1
Schneier, B.2
Lucks, S.3
Muller, F.4
-
32
-
-
38149123508
-
Differential-linear attacks against the stream cipher Phelix
-
Biryukov
-
Wu, H., Preneel, B.: Differential-linear attacks against the stream cipher Phelix. In: Biryukov [11], pp. 87-100
-
LNCS
, pp. 87-100
-
-
Wu, H.1
Preneel, B.2
-
33
-
-
84866712067
-
A new version of Grain- 128 with authentication
-
Ågren, M., Hell, M., Johansson, T., Meier, W.: A new version of Grain- 128 with authentication. In: Symmetric Key Encryption Workshop, SKEW (February 2011)
-
Symmetric Key Encryption Workshop, SKEW (February 2011)
-
-
Ågren, M.1
Hell, M.2
Johansson, T.3
Meier, W.4
|