The hash function BLAKE
This book is about the cryptographic hash function BLAKE, one of the five final contenders in
the SHA3 competition, out of 64 initial submissions. The SHA3 competition was a public …
the SHA3 competition, out of 64 initial submissions. The SHA3 competition was a public …
The complexity of estimating Rényi entropy
It was recently shown that estimating the Shannon entropy H (p) of a discrete k-symbol
distribution p requires Θ (k/log k) samples, a number that grows nearlinearly in the support …
distribution p requires Θ (k/log k) samples, a number that grows nearlinearly in the support …
The past, evolving present, and future of the discrete logarithm
The first practical public key cryptosystem ever published, the Diffie–Hellman key exchange
algorithm, relies for its security on the assumption that discrete logarithms are hard to …
algorithm, relies for its security on the assumption that discrete logarithms are hard to …
Surf feature extraction in encrypted domain
Y Bai, L Zhuo, B Cheng, YF Peng - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Signal processing in the encrypted domain has become a hot research topic, which enable
signal processing tasks in a secure and privacy-preserving manner. Taken the fact that …
signal processing tasks in a secure and privacy-preserving manner. Taken the fact that …
Multi-user collisions: Applications to discrete logarithm, Even-Mansour and PRINCE
In this paper, we investigate the multi-user setting both in public and in secret-key
cryptanalytic applications. In this setting, the adversary tries to recover keys of many users in …
cryptanalytic applications. In this setting, the adversary tries to recover keys of many users in …
Cryptanalysis of iterated even-mansour schemes with two keys
I Dinur, O Dunkelman, N Keller, A Shamir - … 7-11, 2014. Proceedings, Part I …, 2014 - Springer
Abstract The iterated Even-Mansour (EM) scheme is a generalization of the original 1-round
construction proposed in 1991, and can use one key, two keys, or completely independent …
construction proposed in 1991, and can use one key, two keys, or completely independent …
Improved generic attacks against hash-based MACs and HAIFA
I Dinur, G Leurent - Advances in Cryptology–CRYPTO 2014: 34th Annual …, 2014 - Springer
The security of HMAC (and more general hash-based MACs) against state-recovery and
universal forgery attacks was very recently shown to be suboptimal, following a series of …
universal forgery attacks was very recently shown to be suboptimal, following a series of …
[PDF][PDF] A secure ECC-based electronic medical record system.
In recent years, portable devices and wireless communication have been popularly used by
people in their everyday lives. In fact, with these facilities, due to their usage convenience …
people in their everyday lives. In fact, with these facilities, due to their usage convenience …
Batch NFS
DJ Bernstein, T Lange - International Conference on Selected Areas in …, 2014 - Springer
This paper shows, assuming standard heuristics regarding the number-field sieve, that a
“batch NFS” circuit of area L^ 1.181 ...+ o (1) factors L^ 0.5+ o (1) separate B-bit RSA keys in …
“batch NFS” circuit of area L^ 1.181 ...+ o (1) factors L^ 0.5+ o (1) separate B-bit RSA keys in …
Solving the discrete logarithm of a 113-bit Koblitz curve with an FPGA cluster
E Wenger, P Wolfger - Selected Areas in Cryptography--SAC 2014: 21st …, 2014 - Springer
Using FPGAs to compute the discrete logarithms of elliptic curves is a well-known method.
However, until to date only CPU clusters succeeded in computing new elliptic curve discrete …
However, until to date only CPU clusters succeeded in computing new elliptic curve discrete …