Path-quality monitoring in the presence of adversaries
Edge networks connected to the Internet need effective monitoring techniques to drive
routing decisions and detect violations of Service Level Agreements (SLAs). However …
routing decisions and detect violations of Service Level Agreements (SLAs). However …
Stronger security bounds for Wegman-Carter-Shoup authenticators
DJ Bernstein - Annual International Conference on the Theory and …, 2005 - Springer
Shoup proved that various message-authentication codes of the form (n, m)↦ h (m)+ f (n) are
secure against all attacks that see at most 1/ϵ authenticated messages. Here m is a …
secure against all attacks that see at most 1/ϵ authenticated messages. Here m is a …
Quantum key distribution with PRF (Hash, Nonce) achieves everlasting security
K Bibak, R Ritchie - Quantum Information Processing, 2021 - Springer
Peev et al.(Int J Quantum Inf 03: 225–231, 2005) introduced a key-efficient two-step hash
function for authentication in quantum key distribution (QKD). They suggested using a …
function for authentication in quantum key distribution (QKD). They suggested using a …
{Adiantum}: length-preserving encryption for entry-level processors
P Crowley, E Biggers - Cryptology ePrint Archive, 2018 - eprint.iacr.org
We present HBSH, a simple construction for tweakable length-preserving encryption which
supports the fastest options for hashing and stream encryption for processors without AES or …
supports the fastest options for hashing and stream encryption for processors without AES or …
[PDF][PDF] A quantum key distribution protocol for rapid denial of service detection
We introduce a quantum key distribution protocol designed to expose fake users that
connect to Alice or Bob for the purpose of monopolising the link and denying service. It …
connect to Alice or Bob for the purpose of monopolising the link and denying service. It …
Provably secure MACs from differentially-uniform permutations and AES-based implementations
K Minematsu, Y Tsunoo - … : 13th International Workshop, FSE 2006, Graz …, 2006 - Springer
We propose message authentication codes (MACs) that combine a block cipher and an
additional (keyed or unkeyed) permutation. Our MACs are provably secure if the block …
additional (keyed or unkeyed) permutation. Our MACs are provably secure if the block …
Authentication of variable length messages in quantum key distribution
Authentication plays a critical role in the security of quantum key distribution (QKD)
protocols. We propose using Polynomial Hash and its variants for authentication of variable …
protocols. We propose using Polynomial Hash and its variants for authentication of variable …
Deck-based wide block cipher modes and an exposition of the blinded keyed hashing model
A Gunsing, J Daemen… - IACR Transactions on …, 2019 - philosophymindscience.org
We present two tweakable wide block cipher modes from doubly-extendable cryptographic
keyed (deck) functions and a keyed hash function: double-decker and docked-double …
keyed (deck) functions and a keyed hash function: double-decker and docked-double …
Badger–a fast and provably secure MAC
M Boesgaard, T Christensen, E Zenner - … , ACNS 2005, New York, NY, USA …, 2005 - Springer
We present Badger, a new fast and provably secure MAC based on universal hashing. In the
construction, a modified tree hash that is more efficient than standard tree hashing is used …
construction, a modified tree hash that is more efficient than standard tree hashing is used …
Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
P Sarkar - Cryptography and Communications, 2014 - Springer
We describe a systematic framework for using a stream cipher supporting an initialisation
vector (IV) to perform various tasks of authentication and authenticated encryption. These …
vector (IV) to perform various tasks of authentication and authenticated encryption. These …