[图书][B] Cryptography engineering: design principles and practical applications
N Ferguson, B Schneier, T Kohno - 2011 - books.google.com
The ultimate guide to cryptography, updated from an author team of the world's top
cryptography experts. Cryptography is vital to keeping information safe, in an era when the …
cryptography experts. Cryptography is vital to keeping information safe, in an era when the …
The first 30 years of cryptographic hash functions and the NIST SHA-3 competition
B Preneel - Cryptographers' track at the RSA conference, 2010 - Springer
The first designs of cryptographic hash functions date back to the late 1970s; more
proposals emerged in the 1980s. During the 1990s, the number of hash function designs …
proposals emerged in the 1980s. During the 1990s, the number of hash function designs …
EasySMS: A protocol for end-to-end secure transmission of SMS
N Saxena, NS Chaudhari - IEEE Transactions on information …, 2014 - ieeexplore.ieee.org
Nowadays, short message service (SMS) is being used in many daily life applications,
including healthcare monitoring, mobile banking, mobile commerce, and so on. But when …
including healthcare monitoring, mobile banking, mobile commerce, and so on. But when …
Design principles for power grid cyber-infrastructure authentication protocols
Recently, there has been an increased focus and a sense of urgency in developing
standards for Power Grid systems centered on the need for interoperability. Given the threat …
standards for Power Grid systems centered on the need for interoperability. Given the threat …
A novel image encryption algorithm using AES and visual cryptography
VKP Kalubandi, H Vaddi, V Ramineni… - … conference on next …, 2016 - ieeexplore.ieee.org
With the current emergence of the Internet, there is a need to securely transfer images
between systems. In this context, we propose a secure image encryption algorithm that uses …
between systems. In this context, we propose a secure image encryption algorithm that uses …
AES: Current security and efficiency analysis of its alternatives
The Advanced Encryption Standard (AES) has been in existence over the last 11 years. It
was widely accepted as the de facto standard in many security-related applications such as …
was widely accepted as the de facto standard in many security-related applications such as …
Security margin evaluation of SHA-3 contest finalists through SAT-based attacks
Abstract In 2007, the US National Institute of Standards and Technology (NIST) announced
a public contest aiming at the selection of a new standard for a cryptographic hash function …
a public contest aiming at the selection of a new standard for a cryptographic hash function …
[PDF][PDF] The SHAvite-3 hash function
E Biham, O Dunkelman - Submission to NIST (Round 2), 2009 - Citeseer
In this document we present SHAvite-3, a secure and efficient hash function based on the
HAIFA construction and the AES building blocks. SHAvite-3 uses a well understood set of …
HAIFA construction and the AES building blocks. SHAvite-3 uses a well understood set of …
Halka: a lightweight, software friendly block cipher using ultra-lightweight 8-bit S-box
S Das - Cryptology ePrint Archive, 2014 - eprint.iacr.org
This paper presents the design of a lightweight, yet software friendly, block cipher. Most of
the lightweight block ciphers are nibble-oriented as the implementation of a 4-bit S-box is …
the lightweight block ciphers are nibble-oriented as the implementation of a 4-bit S-box is …
" S-Box" Implementation of AES is NOT side-channel resistant
C Ashokkumar, B Roy, MBS Venkatesh… - Cryptology ePrint …, 2018 - eprint.iacr.org
Several successful cache-based attacks have provided strong impetus for developing side
channel resistant software implementations of AES. One of the best-known …
channel resistant software implementations of AES. One of the best-known …