Khiabani, Yahya S.; Wei, Shuangqing A joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakage. (English) Zbl 1427.94079 Inf. Sci. 357, 6-22 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. S. Khiabani} and \textit{S. Wei}, Inf. Sci. 357, 6--22 (2016; Zbl 1427.94079) Full Text: DOI
Korol, Olga; Dorokhov, Mykhailo Evaluation of the computational complexity of some hash functions. (English) Zbl 1410.68113 Simian, Dana (ed.), Modelling and development of intelligent systems. Proceedings of the fourth international conference, Sibiu, Romania, October 28 – November 1, 2015. Sibiu: “Lucian Blaga” University Press. 78-85 (2016). MSC: 68P25 68Q25 94A60 PDFBibTeX XMLCite \textit{O. Korol} and \textit{M. Dorokhov}, in: Modelling and development of intelligent systems. Proceedings of the fourth international conference, Sibiu, Romania, October 28 -- November 1, 2015. Sibiu: ``Lucian Blaga'' University Press. 78--85 (2016; Zbl 1410.68113)
Fomin, Fedor V.; Lokshtanov, Daniel; Panolan, Fahad; Saurabh, Saket Efficient computation of representative families with applications in parameterized and exact algorithms. (English) Zbl 1410.05212 J. ACM 63, No. 4, Article No. 29, 60 p. (2016). MSC: 05D05 68W40 PDFBibTeX XMLCite \textit{F. V. Fomin} et al., J. ACM 63, No. 4, Article No. 29, 60 p. (2016; Zbl 1410.05212) Full Text: DOI
Dobraunig, Christoph; Eichlseder, Maria; Mendel, Florian Analysis of the Kupyna-256 hash function. (English) Zbl 1385.94031 Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 575-590 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Dobraunig} et al., Lect. Notes Comput. Sci. 9783, 575--590 (2016; Zbl 1385.94031) Full Text: DOI
Yuan, Serena Cryptographic hash functions from sequences of lifted Paley graphs. (English) Zbl 1359.05132 Kahrobaei, Delaram (ed.) et al., Algebra and computer science. Joint AMS-EMS-SPM meeting algebra and computer science, Porto, Portugal, June 10–13, 2015. Joint mathematics meetings groups, algorithms, and cryptography, San Antonio, TX, USA, January 10–13, 2015. Joint AMS-Israel Mathematical Union meeting applications of algebra to cryptography, Tel-Aviv, Israel, June 16–19, 2014. Proceedings. Providence, RI: American Mathematical Society (AMS) (ISBN 978-1-4704-2303-2/pbk; 978-1-4704-3587-5/ebook). Contemporary Mathematics 677, 213-229 (2016). MSC: 05C90 05C50 05C76 05C81 05C22 05E18 20B25 94A60 PDFBibTeX XMLCite \textit{S. Yuan}, Contemp. Math. 677, 213--229 (2016; Zbl 1359.05132) Full Text: DOI
Albrecht, Martin; Grassi, Lorenzo; Rechberger, Christian; Roy, Arnab; Tiessen, Tyge MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity. (English) Zbl 1404.94035 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 191-219 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Albrecht} et al., Lect. Notes Comput. Sci. 10031, 191--219 (2016; Zbl 1404.94035) Full Text: DOI Link
Blazy, Olivier; Chevalier, Céline Structure-preserving smooth projective hashing. (English) Zbl 1407.94088 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 339-369 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{O. Blazy} and \textit{C. Chevalier}, Lect. Notes Comput. Sci. 10032, 339--369 (2016; Zbl 1407.94088) Full Text: DOI HAL
Unruh, Dominique Collapse-binding quantum commitments without random oracles. (English) Zbl 1407.94156 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 166-195 (2016). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{D. Unruh}, Lect. Notes Comput. Sci. 10032, 166--195 (2016; Zbl 1407.94156) Full Text: DOI
Miller, Douglas; Scrivener, Adam; Stern, Jesse; Venkitasubramaniam, Muthuramakrishnan On negation complexity of injections, surjections and collision-resistance in cryptography. (English) Zbl 1411.94077 Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 345-363 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Miller} et al., Lect. Notes Comput. Sci. 10095, 345--363 (2016; Zbl 1411.94077) Full Text: DOI
Shpilrain, Vladimir; Sosnovski, Bianca Compositions of linear functions and applications to hashing. (English) Zbl 1353.94073 Groups Complex. Cryptol. 8, No. 2, 155-161 (2016). MSC: 94A60 68P30 20M05 PDFBibTeX XMLCite \textit{V. Shpilrain} and \textit{B. Sosnovski}, Groups Complex. Cryptol. 8, No. 2, 155--161 (2016; Zbl 1353.94073) Full Text: DOI
Applebaum, Benny Cryptographic hardness of random local functions. Survey. (English) Zbl 1360.94293 Comput. Complexity 25, No. 3, 667-722 (2016). MSC: 94A60 68Q17 68P25 PDFBibTeX XMLCite \textit{B. Applebaum}, Comput. Complexity 25, No. 3, 667--722 (2016; Zbl 1360.94293) Full Text: DOI
Klein, Shmuel Tomi Basic concepts in data structures. (English) Zbl 1356.68001 Cambridge: Cambridge University Press (ISBN 978-1-316-61384-9/pbk; 978-1-107-16127-6/hbk; 978-1-316-67622-6/ebook). xii, 220 p. (2016). Reviewer: Ion Iancu (Craiova) MSC: 68-01 68P05 68P10 68R10 PDFBibTeX XMLCite \textit{S. T. Klein}, Basic concepts in data structures. Cambridge: Cambridge University Press (2016; Zbl 1356.68001) Full Text: DOI
Chang, Donghoon; Ghosh, Mohona; Sanadhya, Somitra Kumar Biclique cryptanalysis of full round AES-128 based hashing modes. (English) Zbl 1344.94036 Lin, Dongdai (ed.) et al., Information security and cryptology. 11th international conference, Inscrypt 2015, Beijing, China, November 1–3, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-38897-7/pbk; 978-3-319-38898-4/ebook). Lecture Notes in Computer Science 9589, 3-21 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Chang} et al., Lect. Notes Comput. Sci. 9589, 3--21 (2016; Zbl 1344.94036) Full Text: DOI
Buchmann, Johannes Introduction to cryptography. 6th revised edition. (Einführung in die Kryptographie.) (German) Zbl 1336.94002 Springer-Lehrbuch. Heidelberg: Springer Spektrum (ISBN 978-3-642-39774-5/pbk; 978-3-0642-39775-2/ebook). xxvi, 330 p. (2016). MSC: 94-01 94A60 94A62 00A06 11T71 14G50 68P25 11Y05 11Y11 PDFBibTeX XMLCite \textit{J. Buchmann}, Einführung in die Kryptographie. 6th revised edition. Heidelberg: Springer Spektrum (2016; Zbl 1336.94002) Full Text: DOI
Anshel, Iris; Atkins, Derek; Goldfeld, Dorian; Gunnells, Paul E. A class of hash functions based on the Algebraic Eraser\(^{\text{TM}}\). (English) Zbl 1382.94048 Groups Complex. Cryptol. 8, No. 1, 1-7 (2016). MSC: 94A60 20F36 PDFBibTeX XMLCite \textit{I. Anshel} et al., Groups Complex. Cryptol. 8, No. 1, 1--7 (2016; Zbl 1382.94048) Full Text: DOI
Moody, Dustin; Paul, Souradyuti; Smith-Tone, Daniel Improved indifferentiability security bound for the JH mode. (English) Zbl 1405.94076 Des. Codes Cryptography 79, No. 2, 237-259 (2016). MSC: 94A60 68W40 68Q25 PDFBibTeX XMLCite \textit{D. Moody} et al., Des. Codes Cryptography 79, No. 2, 237--259 (2016; Zbl 1405.94076) Full Text: DOI
Petit, Christophe; Quisquater, Jean-Jacques Cryptographic hash functions and expander graphs: the end of the story? (English) Zbl 1405.94081 Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 304-311 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Petit} and \textit{J.-J. Quisquater}, Lect. Notes Comput. Sci. 9100, 304--311 (2016; Zbl 1405.94081) Full Text: DOI
Cabral, Roberto; López, Julio Fast software implementation of QUARK on a 32-bit architecture. (English) Zbl 1412.94159 Güneysu, Tim (ed.) et al., Lightweight cryptography for security and privacy. 4th international workshop, LightSec 2015, Bochum, Germany, September 10–11, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9542, 115-130 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Cabral} and \textit{J. López}, Lect. Notes Comput. Sci. 9542, 115--130 (2016; Zbl 1412.94159) Full Text: DOI