HAIL: A high-availability and integrity layer for cloud storage
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system
that allows a set of servers to prove to a client that a stored file is intact and retrievable. HAIL …
that allows a set of servers to prove to a client that a stored file is intact and retrievable. HAIL …
White-box cryptography and an AES implementation
S Chow, P Eisen, H Johnson… - Selected Areas in …, 2003 - Springer
Conventional software implementations of cryptographic algorithms are totally insecure
where a hostile user may control the execution environment, or where co-located with …
where a hostile user may control the execution environment, or where co-located with …
UMAC: Fast and secure message authentication
We describe a message authentication algorithm, UMAC, which can authenticate messages
(in software, on contemporary machines) roughly an order of magnitude faster than current …
(in software, on contemporary machines) roughly an order of magnitude faster than current …
[PDF][PDF] Physical-layer Identification of RFID Devices.
In this work we perform the first comprehensive study of physical-layer identification of RFID
transponders. We propose several techniques for the extraction of RFID physical-layer …
transponders. We propose several techniques for the extraction of RFID physical-layer …
Key-recovery attacks on universal hash function based MAC algorithms
H Handschuh, B Preneel - Annual International Cryptology Conference, 2008 - Springer
This paper discusses key recovery and universal forgery attacks on several MAC algorithms
based on universal hash functions. The attacks use a substantial number of verification …
based on universal hash functions. The attacks use a substantial number of verification …
On perfect and adaptive security in exposure-resilient cryptography
We consider the question of adaptive security for two related cryptographic primitives: all-or-
nothing transforms and exposure-resilient functions. Both are concerned with retaining …
nothing transforms and exposure-resilient functions. Both are concerned with retaining …
[图书][B] Universal hash families and the leftover hash lemma, and applications to cryptography and computing
DR Stinson - 2001 - Citeseer
Universal hash families and the leftover hash lemma, and applications to cryptography and
computing Page 1 Universal hash families and the leftover hash lemma, and applications to …
computing Page 1 Universal hash families and the leftover hash lemma, and applications to …
On weak keys and forgery attacks against polynomial-based MAC schemes
G Procter, C Cid - Journal of Cryptology, 2015 - Springer
Universal hash functions are commonly used primitives for fast and secure message
authentication in the form of message authentication codes or authenticated encryption with …
authentication in the form of message authentication codes or authenticated encryption with …
Distributed storage system with efficient handling of file updates
(57) ABSTRACT A client device or other processing device comprises a file encoding
module, with the file encoding module being con figured to separate a file into a plurality of …
module, with the file encoding module being con figured to separate a file into a plurality of …
[PDF][PDF] Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash.
K Bibak, R Ritchie, B Zolfaghari - Quantum Inf. Comput., 2021 - researchgate.net
Quantum key distribution (QKD) offers a very strong property called everlasting security,
which says if authentication is unbroken during the execution of QKD, the generated key …
which says if authentication is unbroken during the execution of QKD, the generated key …