Filters








9 Hits in 6.9 sec

Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers

Aldo Gunsing, Joan Daemen, Bart Mennink
2020 IACR Transactions on Symmetric Cryptology  
In ToSC 2018(4), Daemen et al. performed an in-depth investigation of sound hashing modes based on arbitrary functions, permutations, or block ciphers.  ...  In this errata, we formally fix this glitch by adding an extra term to the security bound, q/2b−n, where q is query complexity, b the width of the permutation or the block size of the block cipher, and  ...  Acknowledgments The authors would like to thank Samuel Neves, Gilles Van Assche, and the anonymous reviewers of ToSC for their valuable feedback. Aldo Gunsing is supported by the Netherlands  ... 
doi:10.13154/tosc.v2020.i3.362-366 dblp:journals/tosc/GunsingDM20 fatcat:o57p54g2gff7floac47hvodmxy

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha
2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17  
We implement and benchmark both approaches and explore the possible choice of f , taking advantage of the recent trend to strive for practical symmetric ciphers with a particularly low number of multiplications  ...  In our signature constructions, the public key is an image y = f (x) of a one-way function f and secret key x.  ...  Last but not least there are the block ciphers and hash functions around MiMC [5] which need less than 2 · s multiplications for s-bit security in a field of size close to 2 s .  ... 
doi:10.1145/3133956.3133997 dblp:conf/ccs/ChaseDGORRSZ17 fatcat:zz67tvgotzfs7kjhwtj7kmi7ry

Applied cryptography: Protocols, algorithms, and source code in C

1994 Computer Law and Security Review  
After all of this, a, b, c, and d are added to A, B, C, D, respectively, and the algorithm continues with the next block of data. The final output is the concatenation of A, B, C, and D.  ...  FF (a, b, c, d, M 12 , 7, 0x6b901122) FF (d, a, b, c, M 13 Those constants, t i , were chosen as follows: In step i, t i is the integer part of 2 32 *abs(sin(i)), where i is in radians.  ...  Other Block-Cipher Modes Block Chaining Mode To use a block algorithm in block chaining (BC) mode, simply XOR the input to the block cipher with the XOR of all the previous ciphertext blocks.  ... 
doi:10.1016/0267-3649(94)90017-5 fatcat:y5tchirflfdwno7dm4dv6ljx2a

Critical perspectives on provable security: Fifteen years of "another look" papers

Neal Koblitz, Alfred Menezes
2019 Advances in Mathematics of Communications  
We give an overview of our critiques of "proofs" of security and a guide to our papers on the subject that have appeared over the past decade and a half.  ...  We also provide numerous additional examples and a few updates and errata. 2010 Mathematics Subject Classification: Primary: 94A60.  ...  Acknowledgments We wish to thank Ian Blake, Sanjit Chatterjee, Sam Jaques, Paul van Oorschot, Francisco Rodríguez Henríquez, and Palash Sarkar for helpful comments on an earlier draft; and Ann Hibner Koblitz  ... 
doi:10.3934/amc.2019034 fatcat:gpftyd4hxjebfpzdqwdes345na

Intel SGX Explained [article]

Victor Costan, Srinivas Devadas
2016 IACR Cryptology ePrint Archive  
Intel's Software Guard Extensions (SGX) is a set of extensions to the Intel architecture that aims to provide integrity and confidentiality guarantees to securitysensitive computation performed on a computer  ...  This paper's contributions are a summary of the Intel-specific architectural and micro-architectural details needed to understand SGX, a detailed and structured presentation of the publicly available information  ...  AES is a secure permutation function, as it can transform any 128-bit block into another 128-bit block.  ... 
dblp:journals/iacr/CostanD16 fatcat:vzg7uthif5fqfbx5pdz3ocs7va

An Exploratory Analysis of Microcode as a Building Block for System Defenses [article]

Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
2020 arXiv   pre-print
Finally, we show how a secure microcode update mechanism and enclave functionality can be implemented in microcode to realize a small trusted execution environment.  ...  All microcode programs and the whole infrastructure needed to reproduce and extend our results are publicly available.  ...  In addition, this work was partly supported by the German Federal Ministry of Education and Research (BMBF Grant 16KIS0592K HWSec and BMBF Grant 16KIS0820 emproof).  ... 
arXiv:2007.03549v1 fatcat:leas2d23yve7ldwmdjxxhg3cby

IEEE Microwave Theory and Techniques Society

2007 IEEE Microwave Magazine  
Notice to users Laws and regulations Users of these documents should consult all applicable laws and regulations.  ...  of amendments, corrigenda, or errata.  ...  Construction and Transmission of MAC PDUs Figure 387 illustrates the various functional blocks involved in the construction of MAC PDU, input and output of each functional block, and sequence in which  ... 
doi:10.1109/mmw.2007.316256 fatcat:26oxmuglerc23mgeimdf35omuy

IEEE Microwave Theory and Techniques Society

2006 IEEE Microwave Magazine  
Notice to users Laws and regulations Users of these documents should consult all applicable laws and regulations.  ...  of amendments, corrigenda, or errata.  ...  Construction and Transmission of MAC PDUs Figure 387 illustrates the various functional blocks involved in the construction of MAC PDU, input and output of each functional block, and sequence in which  ... 
doi:10.1109/mmw.2006.1634021 fatcat:tgzwn33birghjdtgzmj7uo6z3m

Accelerating pre- and post-quantum cryptography [article]

T Tung Chou, DJ Daniel Bernstein, T Tanja Lange
2016
Most of my papers are joint work with others, and therefore I would like to thank my coauthors  ...  Tanja always tries to give me reasons to feel more confident in myself and has always been helpful and supportive in many different ways.  ...  Permutation networks A "permutation network" (or "rearrangeable permutation network" or "switching network") uses a sequence of conditional swaps to apply an arbitrary permutation to an input array S.  ... 
doi:10.6100/ir845487 fatcat:mni2l7q355blbd6hhgklvto4aa