×

Found 1,745 Documents (Results 1–100)

100
MathJax

Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting. (English) Zbl 07512103

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 309-336 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Attacks on beyond-birthday-bound MACs in the quantum setting. (English) Zbl 1485.94090

Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 421-441 (2021).
MSC:  94A60 94A62 81P94
PDF BibTeX XML Cite
Full Text: DOI

On the cost of ASIC hardware crackers: a SHA-1 case study. (English) Zbl 07449896

Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 657-681 (2021).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Design of hash function using two dimensional cellular automata. (English) Zbl 07388835

Giri, Debasis (ed.) et al., Proceedings of the fifth international conference on mathematics and computing, ICMC 2019, Bhubaneswar, India, February 6–9, 2019. Singapore: Springer. Adv. Intell. Syst. Comput. 1170, 33-45 (2021).
MSC:  68-XX
PDF BibTeX XML Cite
Full Text: DOI

Lightweight authenticated encryption mode suitable for threshold implementation. (English) Zbl 07496567

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 705-735 (2020).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Optimal merging in quantum \(k\)-xor and \(k\)-sum algorithms. (English) Zbl 07496554

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 311-340 (2020).
PDF BibTeX XML Cite
Full Text: DOI

Tight security bounds for double-block hash-then-sum MACs. (English) Zbl 1479.94327

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 435-465 (2020).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Mind the composition: birthday bound attacks on EWCDMD and SoKAC21. (English) Zbl 1479.94337

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 203-220 (2020).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Vladimir Petrovich Platonov (on his 80th birthday). (English. Russian original) Zbl 1445.01024

Russ. Math. Surv. 75, No. 2, 387-391 (2020); translation from Usp. Mat. Nauk 75, No. 2, 197-200 (2020).
MSC:  01A70
PDF BibTeX XML Cite
Full Text: DOI MNR

Universal forgery attack against GCM-RUP. (English) Zbl 1457.94161

Jarecki, Stanislaw (ed.), Topics in cryptology – CT-RSA 2020. The cryptographers’ track at the RSA conference 2020, San Francisco, CA, USA, February 24–28, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12006, 15-34 (2020).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

How to build pseudorandom functions from public random permutations. (English) Zbl 1456.94064

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11692, 266-293 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Grigoriĭ Iosifovich Ol’shanskiĭ (on his 70th birthday). (English. Russian original) Zbl 1432.01083

Russ. Math. Surv. 74, No. 3, 555-577 (2019); translation from Usp. Mat. Nauk 74, No. 3, 193-213 (2019).
MSC:  01A70
PDF BibTeX XML Cite
Full Text: DOI

Improved XKX-based AEAD scheme: removing the birthday terms. (English) Zbl 1454.94089

Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 228-246 (2019).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

Parallelizable MACs based on the sum of PRPs with security beyond the birthday bound. (English) Zbl 1458.94308

Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11464, 131-151 (2019).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Evgeniĭ Mikhaĭlovich Chirka. (English. Russian original) Zbl 1412.01020

Russ. Math. Surv. 73, No. 6, 1137-1144 (2018); translation from Usp. Mat. Nauk 73, No. 6, 204-210 (2018).
MSC:  01A70
PDF BibTeX XML Cite
Full Text: DOI MNR

Aleksandr Semenovich Kholevo (on his 75th birthday). (English. Russian original) Zbl 1427.01012

Russ. Math. Surv. 73, No. 6, 1131-1136 (2018); translation from Usp. Mat. Nauk 73, No. 6, 199-203 (2018).
MSC:  01A70
PDF BibTeX XML Cite
Full Text: DOI MNR

Quantum algorithms for the \(k\)-XOR problem. (English) Zbl 1446.94132

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 527-559 (2018).
MSC:  94A60 68Q12
PDF BibTeX XML Cite
Full Text: DOI

Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model. (English) Zbl 1446.94148

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 305-335 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Short variable length domain extenders with beyond birthday bound security. (English) Zbl 1446.94116

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 244-274 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Length-preserving encryption based on single-key tweakable block cipher. (English) Zbl 1443.94086

Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 313-326 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Provable security of (tweakable) block ciphers based on substitution-permutation networks. (English) Zbl 1444.94055

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10991, 722-753 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Generic attacks against beyond-birthday-bound MACs. (English) Zbl 1444.94084

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10991, 306-336 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Can CAESAR beat Galois? Robustness of CAESAR candidates against nonce reusing and high data complexity attacks. (English) Zbl 1440.94102

Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 476-494 (2018).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

A birthday repetition theorem and complexity of approximating dense CSPs. (English) Zbl 1441.68048

Chatzigiannakis, Ioannis (ed.) et al., 44th international colloquium on automata, languages, and programming, ICALP 2017, Warsaw, Poland July 10–14, 2017. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 80, Article 78, 15 p. (2017).
PDF BibTeX XML Cite
Full Text: DOI arXiv

Honest signaling in zero-sum games is hard, and lying is even harder. (English) Zbl 1441.68080

Chatzigiannakis, Ioannis (ed.) et al., 44th international colloquium on automata, languages, and programming, ICALP 2017, Warsaw, Poland July 10–14, 2017. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 80, Article 77, 13 p. (2017).
PDF BibTeX XML Cite
Full Text: DOI arXiv

Blockcipher-based MACs: beyond the birthday bound without message length. (English) Zbl 1417.94076

Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10626, 446-470 (2017).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

A MAC mode for lightweight block ciphers. (English) Zbl 1387.94092

Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 43-59 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Simpira v2: a family of efficient permutations using the AES round function. (English) Zbl 1404.94077

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 95-125 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

EWCDM: an efficient, beyond-birthday secure, nonce-misuse resistant MAC. (English) Zbl 1351.94034

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 121-149 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Counter-in-Tweak: authenticated encryption modes for tweakable block ciphers. (English) Zbl 1351.94063

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 33-63 (2016).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI Link

On the influence of message length in PMAC’s security bounds. (English) Zbl 1385.94057

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 596-621 (2016).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI Link

One-key compression function based MAC with security beyond birthday bound. (English) Zbl 1403.94056

Liu, Joseph K. K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-40252-9/pbk; 978-3-319-40253-6/ebook). Lecture Notes in Computer Science 9722, 343-358 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Valentin Anatol’evich Skvortsov (on his 80th birthday). (English. Russian original) Zbl 1377.01026

Russ. Math. Surv. 71, No. 1, 175-177 (2016); translation from Usp. Mat. Nauk 71, No. 1, 184-186 (2016).
MSC:  01A70
PDF BibTeX XML Cite
Full Text: DOI

Formal modelling and analysis of socio-technical systems. (English) Zbl 1478.91141

Probst, Christian W. (ed.) et al., Semantics, logics, and calculi. Essays dedicated to Hanne Riis Nielson and Flemming Nielson on the occasion of their 60th birthdays. Cham: Springer. Lect. Notes Comput. Sci. 9560, 54-73 (2016).
MSC:  91C99
PDF BibTeX XML Cite
Full Text: DOI

Multiple discrete logarithm problems with auxiliary inputs. (English) Zbl 1396.11142

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 174-188 (2015).
MSC:  11Y16 11T71 94A60
PDF BibTeX XML Cite
Full Text: DOI

Refinements of the \(k\)-tree algorithm for the generalized birthday problem. (English) Zbl 1382.94147

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 683-703 (2015).
MSC:  94A60 05C85
PDF BibTeX XML Cite
Full Text: DOI

Beyond-birthday-bound security for tweakable Even-Mansour ciphers with linear tweak and key mixing. (English) Zbl 1375.94113

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 134-158 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

On the XOR of multiple random permutations. (English) Zbl 1423.94089

Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 619-634 (2015).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI Link

Using an error-correction code for fast, beyond-birthday-bound authentication. (English) Zbl 1382.94173

Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 291-307 (2015).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

Optimally secure tweakable blockciphers. (English) Zbl 1382.94141

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 428-448 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

The indistinguishability of the XOR of \(k\) permutations. (English) Zbl 1382.94084

Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 285-302 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Vladimir Petrovich Platonov (on his 75th birthday). (English. Russian original) Zbl 1316.01014

Russ. Math. Surv. 70, No. 1, 197-201 (2015); translation from Usp. Mat. Nauk. 70, No. 1, 204-207 (2015).
MSC:  01A70
PDF BibTeX XML Cite
Full Text: DOI

The collected papers of Albert Einstein. Vol. 14. The Berlin years: writings and correspondence, April 1923 – May 1925. English translation of selected texts. Translated by Ann M. Hentschel and Jennifer Nollar James in consultation with Klaus Hentschel. Edited by Diana Kormos Buchwald, József Illy, Ze’ev Rosenkranz, Tilman Sauer and Osik Moses. (English) Zbl 1321.01003

Princeton, NJ: Princeton University Press (ISBN 978-0-691-16422-9/pbk). xxx, 522 p. (2015).
MSC:  01A75 01A60
PDF BibTeX XML Cite

The collected papers of Albert Einstein. Vol. 14. The Berlin years: writings and correspondence, April 1923 – May 1925. Edited by Diana Kormos Buchwald, József Illy, Ze’ev Rosenkranz, Tilman Sauer and Osik Moses. (English, German, French) Zbl 1321.01002

Princeton, NJ: Princeton University Press (ISBN 978-0-691-16410-6/hbk). ci, 1103 p. (2015).
MSC:  01A75 01A60
PDF BibTeX XML Cite

Filter Results by …

Document Type

Database

Reviewing State

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Classification

all top 3

Biographic Reference

all top 3

Software