HAIL: A high-availability and integrity layer for cloud storage

KD Bowers, A Juels, A Oprea - Proceedings of the 16th ACM conference …, 2009 - dl.acm.org
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system
that allows a set of servers to prove to a client that a stored file is intact and retrievable. HAIL …

White-box cryptography and an AES implementation

S Chow, P Eisen, H Johnson… - Selected Areas in …, 2003 - Springer
Conventional software implementations of cryptographic algorithms are totally insecure
where a hostile user may control the execution environment, or where co-located with …

UMAC: Fast and secure message authentication

J Black, S Halevi, H Krawczyk, T Krovetz… - Advances in Cryptology …, 1999 - Springer
We describe a message authentication algorithm, UMAC, which can authenticate messages
(in software, on contemporary machines) roughly an order of magnitude faster than current …

[PDF][PDF] Physical-layer Identification of RFID Devices.

B Danev, TS Heydt-Benjamin, S Capkun - USENIX security symposium, 2009 - usenix.org
In this work we perform the first comprehensive study of physical-layer identification of RFID
transponders. We propose several techniques for the extraction of RFID physical-layer …

Key-recovery attacks on universal hash function based MAC algorithms

H Handschuh, B Preneel - Annual International Cryptology Conference, 2008 - Springer
This paper discusses key recovery and universal forgery attacks on several MAC algorithms
based on universal hash functions. The attacks use a substantial number of verification …

On perfect and adaptive security in exposure-resilient cryptography

Y Dodis, A Sahai, A Smith - … 2001: International Conference on the Theory …, 2001 - Springer
We consider the question of adaptive security for two related cryptographic primitives: all-or-
nothing transforms and exposure-resilient functions. Both are concerned with retaining …

[图书][B] Universal hash families and the leftover hash lemma, and applications to cryptography and computing

DR Stinson - 2001 - Citeseer
Universal hash families and the leftover hash lemma, and applications to cryptography and
computing Page 1 Universal hash families and the leftover hash lemma, and applications to …

On weak keys and forgery attacks against polynomial-based MAC schemes

G Procter, C Cid - Journal of Cryptology, 2015 - Springer
Universal hash functions are commonly used primitives for fast and secure message
authentication in the form of message authentication codes or authenticated encryption with …

Distributed storage system with efficient handling of file updates

A Juels, KD Bowers, A Oprea - US Patent 8,984,384, 2015 - Google Patents
(57) ABSTRACT A client device or other processing device comprises a file encoding
module, with the file encoding module being con figured to separate a file into a plurality of …

[PDF][PDF] Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash.

K Bibak, R Ritchie, B Zolfaghari - Quantum Inf. Comput., 2021 - researchgate.net
Quantum key distribution (QKD) offers a very strong property called everlasting security,
which says if authentication is unbroken during the execution of QKD, the generated key …