Sciweavers

1562 search results - page 136 / 313
» Mathematics, Cryptology, Security
Sort
View
INDOCRYPT
2005
Springer
14 years 1 months ago
Towards Optimal Double-Length Hash Functions
In this paper we design several double length hash functions and study their security properties in the random oracle model. We design a class of double length hash functions (and ...
Mridul Nandi
FSE
2003
Springer
112views Cryptology» more  FSE 2003»
14 years 1 months ago
Practical Symmetric On-Line Encryption
Abstract. This paper addresses the security of symmetric cryptosystems in the blockwise adversarial model. At Crypto 2002, Joux, Martinet and Valette have proposed a new kind of at...
Pierre-Alain Fouque, Gwenaëlle Martinet, Guil...
FSE
2003
Springer
99views Cryptology» more  FSE 2003»
14 years 1 months ago
Rabbit: A New High-Performance Stream Cipher
Abstract. We present a new stream cipher, Rabbit, based on iterating a set of coupled nonlinear functions. Rabbit is characterized by a high performance in software with a measured...
Martin Boesgaard, Mette Vesterager, Thomas Pederse...
CRYPTO
2007
Springer
104views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
At Crypto ’06, Bellare presented new security proofs for HMAC and NMAC, under the assumption that the underlying compression function is a pseudo-random function family. Converse...
Pierre-Alain Fouque, Gaëtan Leurent, Phong Q....
IMA
2005
Springer
52views Cryptology» more  IMA 2005»
14 years 1 months ago
Domain Expansion of MACs: Alternative Uses of the FIL-MAC
In this paper, a study of a paradigm for domain expansion of MACs is generalized. In particular, a tradeoff between the efficiency of a MAC and the tightness of its security reduc...
Ueli M. Maurer, Johan Sjödin