Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher

Z Zhang, Z Qin, C Guo - Designs, Codes and Cryptography, 2023 - Springer
Recent work of Bao et al.(in: Canteaut and Ishai (eds) EUROCRYPT 2020, Part II. LNCS.
Springer, Heidelberg 2020) repopularized tweakable blockciphers minimizing the overhead …

[PDF][PDF] Constructions based on the AES round and polynomial multiplication that are efficient on modern processor architectures

S Gueron - The Third NIST Workshop on Block Cipher Modes of …, 2023 - csrc.nist.gov
The Advanced Encryption Standard (AES) has become the most frequently used block
cipher since standardization in 2001. Processor instructions that speed up AES …

Spiritual dimension to organization citizenship behavior: The mediating role of adaptive leadership and quality of work life

WE Pujianto, R Purwono, E Evendi… - Jurnal Ekonomi …, 2023 - ejournal.unikama.ac.id
This study aims to determine the relationship of the spiritual attachment dimension to
adaptive leadership, QWL, and OCB. In addition, adaptive leadership and QWL are …

A Formal Treatment of Envelope Encryption

S Hirose, K Minematsu - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Envelope encryption is a method to encrypt data with two distinct keys in its basic form. Data
is first encrypted with a data-encryption key, and then the data-encryption key is encrypted …

Post-Quantum Symmetric Cryptography

NP María - … Cryptography, Volume 2: Cryptanalysis and Future …, 2024 - books.google.com
Until recently, the consequences of quantum adversaries on symmetric primitives were
much less studied. The main quantum algorithm relevant to symmetric cryptography is …

Post‐Quantum Symmetric Cryptography

M NAYA‐PLASENCIA - Symmetric Cryptography 2 …, 2024 - Wiley Online Library
The scientific community is expending significant effort to anticipate the enormous
consequences of the arrival of quantum computers in cryptography. The main quantum …

[PDF][PDF] Flexible Authenticated Encryption

S Menda, J Len, VT Hoang, M Bellare, T Ristenpart - 2023 - csrc.nist.gov
We define and build a new type of AEAD scheme that we call flexible. Flexibility is intended
as an answer to the growing list of desired security and performance features for future …

A weakness in OCB3 used with short nonces allowing for a break of authenticity and confidentiality

J Liénardy, F Lafitte - Information Processing Letters, 2024 - Elsevier
OCB3 is a mature and provably secure authenticated encryption mode of operation which
allows for associated data (AEAD). This note reports a small flaw in the security proof of …

Padding-based forgeries in the mode XOCB

J Liénardy - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this note, we identify a minor flaw in the design of the XOCB mode, presented at
Eurocrypt'23. This vulnerability enables trivial tag forgeries and arises from the padding …

PERAN ORGANIZATIONAL CITIZENSHIP BEHAVIOR DENGAN JOB SATISFACTION STUDI KASUS: PT PERTAMINA LUBRICANTS-PRODUCTION UNIT CILACAP

DA Ashari, I Hermawan… - BISECER (Business …, 2024 - ejournal.undaris.ac.id
Abstract Organizational Citizenship Behavior (OCB) menjadi tantangan di dunia kerja saat
ini, karena organisasi tentunya akan merasa senang apabila memiliki karyawan yang …