搜索结果: 1-8 共查到“军队指挥学 sponges”相关记录8条 . 查询时间(0.083 秒)
Sponges Resist Leakage: The Case of Authenticated Encryption
AEAD Leakage Resilience Side Channels
2019/9/17
In this work we advance the study of leakage-resilient Authenticated Encryption with Associated Data (AEAD) and lay the theoretical groundwork for building such schemes from sponges. Building on the w...
Quantum Indistinguishability of Random Sponges
Symmetric cryptography keyed sponges indistinguishability
2019/1/26
In this work we show that the sponge construction can be used to construct quantum-secure pseudorandom functions. As our main result we prove that random sponges are quantum indistinguishable from ran...
Key Prediction Security of Keyed Sponges
outer-keyed sponge full-keyed sponge key prediction
2018/5/22
The keyed sponge is a well-accepted method for message authentication. It processes data at a certain rate by sequential evaluation of an underlying permutation. If the key size kk is smaller than the...
Collapsing sponges: Post-quantum security of the sponge construction
quantum cryptography hash functions
2017/3/31
We investigate the post-quantum security of hash functions based on the sponge construction. A crucial property for hash functions in the post-quantum setting is the collapsing property (a strengtheni...
New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length
PRF XOF game playing
2016/3/18
We provide new bounds for the pseudo-random function security
of keyed sponge constructions. For the case c ≤ b/2 (c the capacity
and b the permutation size), our result improves over all previously...
In this document we present an introductory overview of the algorithms
and design components underlying the Keccac cryptographic primitive
and the Keyak encryption scheme for authenticated (session-...
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64
random function Collision Probability Spectrum collision tree
2016/1/23
In this paper, we investigate the properties of iterative non-injective functions and the security of primitives where they are used. First, we introduce the Collision Probability Spectrum (CPS) param...
The tight analysis of keyed sponges is our main result and we see this as an important step in validating SHA-3-based authentication before its deployment. Still, our analysis crucially relies on the ...