The hash function BLAKE

JP Aumasson, W Meier, RCW Phan, L Henzen - 2014 - Springer
This book is about the cryptographic hash function BLAKE, one of the five final contenders in
the SHA3 competition, out of 64 initial submissions. The SHA3 competition was a public …

The complexity of estimating Rényi entropy

J Acharya, A Orlitsky, AT Suresh, H Tyagi - … of the twenty-sixth annual ACM …, 2014 - SIAM
It was recently shown that estimating the Shannon entropy H (p) of a discrete k-symbol
distribution p requires Θ (k/log k) samples, a number that grows nearlinearly in the support …

The past, evolving present, and future of the discrete logarithm

A Joux, A Odlyzko, C Pierrot - Open Problems in Mathematics and …, 2014 - Springer
The first practical public key cryptosystem ever published, the Diffie–Hellman key exchange
algorithm, relies for its security on the assumption that discrete logarithms are hard to …

Surf feature extraction in encrypted domain

Y Bai, L Zhuo, B Cheng, YF Peng - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Signal processing in the encrypted domain has become a hot research topic, which enable
signal processing tasks in a secure and privacy-preserving manner. Taken the fact that …

Multi-user collisions: Applications to discrete logarithm, Even-Mansour and PRINCE

PA Fouque, A Joux, C Mavromati - … on the Theory and Application of …, 2014 - Springer
In this paper, we investigate the multi-user setting both in public and in secret-key
cryptanalytic applications. In this setting, the adversary tries to recover keys of many users in …

Cryptanalysis of iterated even-mansour schemes with two keys

I Dinur, O Dunkelman, N Keller, A Shamir - … 7-11, 2014. Proceedings, Part I …, 2014 - Springer
Abstract The iterated Even-Mansour (EM) scheme is a generalization of the original 1-round
construction proposed in 1991, and can use one key, two keys, or completely independent …

Improved generic attacks against hash-based MACs and HAIFA

I Dinur, G Leurent - Advances in Cryptology–CRYPTO 2014: 34th Annual …, 2014 - Springer
The security of HMAC (and more general hash-based MACs) against state-recovery and
universal forgery attacks was very recently shown to be suboptimal, following a series of …

[PDF][PDF] A secure ECC-based electronic medical record system.

KL Tsai, FY Leu, TH Wu, S Chiou, YW Liu… - J. Internet Serv. Inf …, 2014 - isyou.info
In recent years, portable devices and wireless communication have been popularly used by
people in their everyday lives. In fact, with these facilities, due to their usage convenience …

Batch NFS

DJ Bernstein, T Lange - International Conference on Selected Areas in …, 2014 - Springer
This paper shows, assuming standard heuristics regarding the number-field sieve, that a
“batch NFS” circuit of area L^ 1.181 ...+ o (1) factors L^ 0.5+ o (1) separate B-bit RSA keys in …

Solving the discrete logarithm of a 113-bit Koblitz curve with an FPGA cluster

E Wenger, P Wolfger - Selected Areas in Cryptography--SAC 2014: 21st …, 2014 - Springer
Using FPGAs to compute the discrete logarithms of elliptic curves is a well-known method.
However, until to date only CPU clusters succeeded in computing new elliptic curve discrete …