[图书][B] Cryptography engineering: design principles and practical applications

N Ferguson, B Schneier, T Kohno - 2011 - books.google.com
The ultimate guide to cryptography, updated from an author team of the world's top
cryptography experts. Cryptography is vital to keeping information safe, in an era when the …

The first 30 years of cryptographic hash functions and the NIST SHA-3 competition

B Preneel - Cryptographers' track at the RSA conference, 2010 - Springer
The first designs of cryptographic hash functions date back to the late 1970s; more
proposals emerged in the 1980s. During the 1990s, the number of hash function designs …

EasySMS: A protocol for end-to-end secure transmission of SMS

N Saxena, NS Chaudhari - IEEE Transactions on information …, 2014 - ieeexplore.ieee.org
Nowadays, short message service (SMS) is being used in many daily life applications,
including healthcare monitoring, mobile banking, mobile commerce, and so on. But when …

Design principles for power grid cyber-infrastructure authentication protocols

H Khurana, R Bobba, T Yardley… - 2010 43rd Hawaii …, 2010 - ieeexplore.ieee.org
Recently, there has been an increased focus and a sense of urgency in developing
standards for Power Grid systems centered on the need for interoperability. Given the threat …

A novel image encryption algorithm using AES and visual cryptography

VKP Kalubandi, H Vaddi, V Ramineni… - … conference on next …, 2016 - ieeexplore.ieee.org
With the current emergence of the Internet, there is a need to securely transfer images
between systems. In this context, we propose a secure image encryption algorithm that uses …

AES: Current security and efficiency analysis of its alternatives

H Isa, I Bahari, H Sufian… - 2011 7th International …, 2011 - ieeexplore.ieee.org
The Advanced Encryption Standard (AES) has been in existence over the last 11 years. It
was widely accepted as the de facto standard in many security-related applications such as …

Security margin evaluation of SHA-3 contest finalists through SAT-based attacks

E Homsirikamol, P Morawiecki, M Rogawski… - … Information Systems and …, 2012 - Springer
Abstract In 2007, the US National Institute of Standards and Technology (NIST) announced
a public contest aiming at the selection of a new standard for a cryptographic hash function …

[PDF][PDF] The SHAvite-3 hash function

E Biham, O Dunkelman - Submission to NIST (Round 2), 2009 - Citeseer
In this document we present SHAvite-3, a secure and efficient hash function based on the
HAIFA construction and the AES building blocks. SHAvite-3 uses a well understood set of …

Halka: a lightweight, software friendly block cipher using ultra-lightweight 8-bit S-box

S Das - Cryptology ePrint Archive, 2014 - eprint.iacr.org
This paper presents the design of a lightweight, yet software friendly, block cipher. Most of
the lightweight block ciphers are nibble-oriented as the implementation of a 4-bit S-box is …

" S-Box" Implementation of AES is NOT side-channel resistant

C Ashokkumar, B Roy, MBS Venkatesh… - Cryptology ePrint …, 2018 - eprint.iacr.org
Several successful cache-based attacks have provided strong impetus for developing side
channel resistant software implementations of AES. One of the best-known …