SPHINCS: practical stateless hash-based signatures

DJ Bernstein, D Hopwood, A Hülsing, T Lange… - … conference on the …, 2015 - Springer
This paper introduces a high-security post-quantum stateless hash-based signature scheme
that signs hundreds of messages per second on a modern 4-core 3.5 GHz Intel CPU …

Fully homomorphic SIMD operations

NP Smart, F Vercauteren - Designs, codes and cryptography, 2014 - Springer
Abstract At PKC 2010 Smart and Vercauteren presented a variant of Gentry's fully
homomorphic public key encryption scheme and mentioned that the scheme could support …

Topics and techniques in distribution testing: A biased but representative sample

CL Canonne - Foundations and Trends® in Communications …, 2022 - nowpublishers.com
We focus on some specific problems in distribution testing, taking goodness-of-fit as a
running example. In particular, we do not aim to provide a comprehensive summary of all the …

Data-parallel hashing techniques for GPU architectures

B Lessley, H Childs - IEEE Transactions on Parallel and …, 2019 - ieeexplore.ieee.org
Hash tables are a fundamental data structure for effectively storing and accessing sparse
data, with widespread usage in domains ranging from computer graphics to machine …

Dns cache poisoning attack: Resurrections with side channels

K Man, X Zhou, Z Qian - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
DNS is one of the fundamental and ancient protocols on the Internet that supports many
network applications and services. Unfortunately, DNS was designed without security in …

ISAP–towards side-channel secure authenticated encryption

C Dobraunig, M Eichlseder, S Mangard… - IACR Transactions on …, 2017 - tosc.iacr.org
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a
serious threat to cryptographic implementations. One approach to counteract such attacks …

Interactive inference under information constraints

J Acharya, CL Canonne, Y Liu, Z Sun… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We study the role of interactivity in distributed statistical inference under information
constraints, eg, communication constraints and local differential privacy. We focus on the …

Secure keyed hashing on programmable switches

S Yoo, X Chen - Proceedings of the ACM SIGCOMM 2021 Workshop on …, 2021 - dl.acm.org
Cyclic Redundancy Check (CRC) is a computationally inexpensive function readily
available in many high-speed networking devices, and thus it is used extensively as a hash …

AES-GCM-SIV: specification and analysis

S Gueron, A Langley, Y Lindell - Cryptology ePrint Archive, 2017 - eprint.iacr.org
In this paper, we describe and analyze the security of the AES-GCM-SIV mode of operation,
as defined in the CFRG specification\cite {CFRG}. This mode differs from the original GCM …

Can Learned Models Replace Hash Functions?

I Sabek, K Vaidya, D Horn, A Kipf… - Proceedings of the …, 2022 - par.nsf.gov
Hashing is a fundamental operation in database management, playing a key role in the
implementation of numerous core database data structures and algorithms. Traditional hash …