Experimental quantum key distribution certified by Bell's theorem

DP Nadlinger, P Drmota, BC Nichol, G Araneda… - Nature, 2022 - nature.com
Cryptographic key exchange protocols traditionally rely on computational conjectures such
as the hardness of prime factorization to provide security against eavesdropping attacks …

Faster 64-bit universal hashing using carry-less multiplications

D Lemire, O Kaser - Journal of Cryptographic Engineering, 2016 - Springer
Intel and AMD support the carry-less multiplication (CLMUL) instruction set in their x64
processors. We use CLMUL to implement an almost universal 64-bit hash family (CLHASH) …

MAC reforgeability

J Black, M Cochran - … Encryption: 16th International Workshop, FSE 2009 …, 2009 - Springer
Abstract Message Authentication Codes (MACs) are core algorithms deployed in virtually
every security protocol in common usage. In these protocols, the integrity and authenticity of …

RIV for robust authenticated encryption

F Abed, C Forler, E List, S Lucks, J Wenzel - Fast Software Encryption …, 2016 - Springer
Typical AE schemes are supposed to be secure when used as specified. However, they can–
and often do–fail miserably when used improperly. As a partial remedy, Rogaway and …

Regular and almost universal hashing: an efficient implementation

D Ivanchykhin, S Ignatchenko… - Software: Practice and …, 2017 - Wiley Online Library
Random hashing can provide guarantees regarding the performance of data structures such
as hash tables–even in an adversarial setting. Many existing families of hash functions are …

-A New Universal MAC Scheme

E Fleischmann, C Forler, S Lucks - Western European Workshop on …, 2011 - Springer
In this paper, we introduce a new class of universal hash function families called almost
regular universal (ε− ARU). Informally, an ε− ARU hash function family is almost universal …

Design, Analysis, and Implementation of Symmetric-key (Authenticated) Ciphers

E List - 2021 - e-pub.uni-weimar.de
Modern cryptography has become an often ubiquitous but essential part of our daily lives.
Protocols for secure authentication and encryption protect our communication with various …

[PDF][PDF] AES-VCM, AN AES-GCM CONSTRUCTION USING AN INTEGER-BASED UNIVERSAL HASH FUNCTION.

E Knapp - 2017 - research.google.com
AES-VCM, AN AES-GCM CONSTRUCTION USING AN INTEGER-BASED UNIVERSAL HASH
FUNCTION. 1. Introduction Construction of MACs based on u Page 1 AES-VCM, AN AES-GCM …

Tweakable Ciphers: Constructions and Applications

RS Terashima - 2015 - pdxscholar.library.pdx.edu
Tweakable ciphers are a building block used to construct a variety of cryptographic
algorithms. Typically, one proves (via a reduction) that a tweakable-cipher-based algorithm …