Experimental quantum key distribution certified by Bell's theorem
Cryptographic key exchange protocols traditionally rely on computational conjectures such
as the hardness of prime factorization to provide security against eavesdropping attacks …
as the hardness of prime factorization to provide security against eavesdropping attacks …
Faster 64-bit universal hashing using carry-less multiplications
Intel and AMD support the carry-less multiplication (CLMUL) instruction set in their x64
processors. We use CLMUL to implement an almost universal 64-bit hash family (CLHASH) …
processors. We use CLMUL to implement an almost universal 64-bit hash family (CLHASH) …
MAC reforgeability
J Black, M Cochran - … Encryption: 16th International Workshop, FSE 2009 …, 2009 - Springer
Abstract Message Authentication Codes (MACs) are core algorithms deployed in virtually
every security protocol in common usage. In these protocols, the integrity and authenticity of …
every security protocol in common usage. In these protocols, the integrity and authenticity of …
RIV for robust authenticated encryption
Typical AE schemes are supposed to be secure when used as specified. However, they can–
and often do–fail miserably when used improperly. As a partial remedy, Rogaway and …
and often do–fail miserably when used improperly. As a partial remedy, Rogaway and …
Regular and almost universal hashing: an efficient implementation
D Ivanchykhin, S Ignatchenko… - Software: Practice and …, 2017 - Wiley Online Library
Random hashing can provide guarantees regarding the performance of data structures such
as hash tables–even in an adversarial setting. Many existing families of hash functions are …
as hash tables–even in an adversarial setting. Many existing families of hash functions are …
-A New Universal MAC Scheme
E Fleischmann, C Forler, S Lucks - Western European Workshop on …, 2011 - Springer
In this paper, we introduce a new class of universal hash function families called almost
regular universal (ε− ARU). Informally, an ε− ARU hash function family is almost universal …
regular universal (ε− ARU). Informally, an ε− ARU hash function family is almost universal …
Design, Analysis, and Implementation of Symmetric-key (Authenticated) Ciphers
E List - 2021 - e-pub.uni-weimar.de
Modern cryptography has become an often ubiquitous but essential part of our daily lives.
Protocols for secure authentication and encryption protect our communication with various …
Protocols for secure authentication and encryption protect our communication with various …
[PDF][PDF] AES-VCM, AN AES-GCM CONSTRUCTION USING AN INTEGER-BASED UNIVERSAL HASH FUNCTION.
E Knapp - 2017 - research.google.com
AES-VCM, AN AES-GCM CONSTRUCTION USING AN INTEGER-BASED UNIVERSAL HASH
FUNCTION. 1. Introduction Construction of MACs based on u Page 1 AES-VCM, AN AES-GCM …
FUNCTION. 1. Introduction Construction of MACs based on u Page 1 AES-VCM, AN AES-GCM …
Tweakable Ciphers: Constructions and Applications
RS Terashima - 2015 - pdxscholar.library.pdx.edu
Tweakable ciphers are a building block used to construct a variety of cryptographic
algorithms. Typically, one proves (via a reduction) that a tweakable-cipher-based algorithm …
algorithms. Typically, one proves (via a reduction) that a tweakable-cipher-based algorithm …