×

Found 18 Documents (Results 1–18)

Evaluation of the computational complexity of some hash functions. (English) Zbl 1410.68113

Simian, Dana (ed.), Modelling and development of intelligent systems. Proceedings of the fourth international conference, Sibiu, Romania, October 28 – November 1, 2015. Sibiu: “Lucian Blaga” University Press. 78-85 (2016).
MSC:  68P25 68Q25 94A60
PDFBibTeX XMLCite

Analysis of the Kupyna-256 hash function. (English) Zbl 1385.94031

Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 575-590 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptographic hash functions from sequences of lifted Paley graphs. (English) Zbl 1359.05132

Kahrobaei, Delaram (ed.) et al., Algebra and computer science. Joint AMS-EMS-SPM meeting algebra and computer science, Porto, Portugal, June 10–13, 2015. Joint mathematics meetings groups, algorithms, and cryptography, San Antonio, TX, USA, January 10–13, 2015. Joint AMS-Israel Mathematical Union meeting applications of algebra to cryptography, Tel-Aviv, Israel, June 16–19, 2014. Proceedings. Providence, RI: American Mathematical Society (AMS) (ISBN 978-1-4704-2303-2/pbk; 978-1-4704-3587-5/ebook). Contemporary Mathematics 677, 213-229 (2016).
PDFBibTeX XMLCite
Full Text: DOI

MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity. (English) Zbl 1404.94035

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 191-219 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Structure-preserving smooth projective hashing. (English) Zbl 1407.94088

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 339-369 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Collapse-binding quantum commitments without random oracles. (English) Zbl 1407.94156

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 166-195 (2016).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

On negation complexity of injections, surjections and collision-resistance in cryptography. (English) Zbl 1411.94077

Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 345-363 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Biclique cryptanalysis of full round AES-128 based hashing modes. (English) Zbl 1344.94036

Lin, Dongdai (ed.) et al., Information security and cryptology. 11th international conference, Inscrypt 2015, Beijing, China, November 1–3, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-38897-7/pbk; 978-3-319-38898-4/ebook). Lecture Notes in Computer Science 9589, 3-21 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptographic hash functions and expander graphs: the end of the story? (English) Zbl 1405.94081

Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 304-311 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fast software implementation of QUARK on a 32-bit architecture. (English) Zbl 1412.94159

Güneysu, Tim (ed.) et al., Lightweight cryptography for security and privacy. 4th international workshop, LightSec 2015, Bochum, Germany, September 10–11, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9542, 115-130 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 3

Main Field

all top 3

Software