Path-quality monitoring in the presence of adversaries

S Goldberg, D Xiao, E Tromer, B Barak… - ACM SIGMETRICS …, 2008 - dl.acm.org
Edge networks connected to the Internet need effective monitoring techniques to drive
routing decisions and detect violations of Service Level Agreements (SLAs). However …

Stronger security bounds for Wegman-Carter-Shoup authenticators

DJ Bernstein - Annual International Conference on the Theory and …, 2005 - Springer
Shoup proved that various message-authentication codes of the form (n, m)↦ h (m)+ f (n) are
secure against all attacks that see at most 1/ϵ authenticated messages. Here m is a …

Quantum key distribution with PRF (Hash, Nonce) achieves everlasting security

K Bibak, R Ritchie - Quantum Information Processing, 2021 - Springer
Peev et al.(Int J Quantum Inf 03: 225–231, 2005) introduced a key-efficient two-step hash
function for authentication in quantum key distribution (QKD). They suggested using a …

{Adiantum}: length-preserving encryption for entry-level processors

P Crowley, E Biggers - Cryptology ePrint Archive, 2018 - eprint.iacr.org
We present HBSH, a simple construction for tweakable length-preserving encryption which
supports the fastest options for hashing and stream encryption for processors without AES or …

[PDF][PDF] A quantum key distribution protocol for rapid denial of service detection

AB Price, JG Rarity, C Erven - EPJ Quantum Technology, 2020 - Springer
We introduce a quantum key distribution protocol designed to expose fake users that
connect to Alice or Bob for the purpose of monopolising the link and denying service. It …

Provably secure MACs from differentially-uniform permutations and AES-based implementations

K Minematsu, Y Tsunoo - … : 13th International Workshop, FSE 2006, Graz …, 2006 - Springer
We propose message authentication codes (MACs) that combine a block cipher and an
additional (keyed or unkeyed) permutation. Our MACs are provably secure if the block …

Authentication of variable length messages in quantum key distribution

K Bibak, BM Kapron, V Srinivasan - EPJ Quantum Technology, 2022 - Springer
Authentication plays a critical role in the security of quantum key distribution (QKD)
protocols. We propose using Polynomial Hash and its variants for authentication of variable …

Deck-based wide block cipher modes and an exposition of the blinded keyed hashing model

A Gunsing, J Daemen… - IACR Transactions on …, 2019 - philosophymindscience.org
We present two tweakable wide block cipher modes from doubly-extendable cryptographic
keyed (deck) functions and a keyed hash function: double-decker and docked-double …

Badger–a fast and provably secure MAC

M Boesgaard, T Christensen, E Zenner - … , ACNS 2005, New York, NY, USA …, 2005 - Springer
We present Badger, a new fast and provably secure MAC based on universal hashing. In the
construction, a modified tree hash that is more efficient than standard tree hashing is used …

Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector

P Sarkar - Cryptography and Communications, 2014 - Springer
We describe a systematic framework for using a stream cipher supporting an initialisation
vector (IV) to perform various tasks of authentication and authenticated encryption. These …