Filters








5 Hits in 6.6 sec

Symmetric Cryptography (Dagstuhl Seminar 20041)

Nils Gregor Leander, Bart Mennink, Kaisa Nyberg, Kan Yasuda
2020 Dagstuhl Reports  
Participants of the seminar presented their ongoing work and new results on topics of (quantum) cryptanalysis and provable security of symmetric cryptographic primitives.  ...  The seminar was held on January 19-24, 2020 in Schloss Dagstuhl - Leibniz Center for Informatics. This was the seventh seminar in the series "Symmetric Cryptography".  ...  We then propose several directions of interest. Firstly we point out the similarity of DECK function and multi-forkcipher security notions, and propose to study their relation.  ... 
doi:10.4230/dagrep.10.1.130 dblp:journals/dagstuhl-reports/LeanderMNY20 fatcat:7oic7mmj5fht7heg73kyxano2e

Applied cryptography: Protocols, algorithms, and source code in C

1994 Computer Law and Security Review  
After all of this, a, b, c, and d are added to A, B, C, D, respectively, and the algorithm continues with the next block of data. The final output is the concatenation of A, B, C, and D.  ...  FF (a, b, c, d, M 12 , 7, 0x6b901122) FF (d, a, b, c, M 13 Those constants, t i , were chosen as follows: In step i, t i is the integer part of 2 32 *abs(sin(i)), where i is in radians.  ...  And there are some cryptanalytic attacks against this technique with RSA signatures (see Section 19.3 ).  ... 
doi:10.1016/0267-3649(94)90017-5 fatcat:y5tchirflfdwno7dm4dv6ljx2a

Where Do New Ideas Come From? How Do They Emerge? Epistemology as Computation (Information Processing) [chapter]

Gordana Dodig-Crnkovic
2007 Randomness and Complexity, From Leibniz to Chaitin  
5 The main contribution shared by AIT founding fathers in the mid 1960s was the new type of complexity-which is invariant up to an additive constant-and, with it, a new way to reason about computation.  ...  AIT (hands-on programming), are central for the field.  ...  Acknowledgements I am greatly indebted to Paul Vitányi for fostering my research into concrete definitions of Kolmogorov complexity, and to Robert Solovay for illuminating discussions on my definitions  ... 
doi:10.1142/9789812770837_0015 fatcat:hhtjs3z765chpebraxckg3p4hu

Privacy on the line: the politics of wiretapping and encryption

1998 ChoiceReviews  
Slightly later two fundamental cryptanalytic techniques were developed.  ...  It is intended as a primitive for building more complex modes of operation suitable for use in encrypting common data formats (USDoC 1980) . DES is a shift-register system in a modern style.  ...  , [141] [142] 128-131, 194 legalization of, 192-195 limits on, 193-195 minimization of, 372 in nineteenth century, 177 operation of, 131-133 and organized crime, 189-192, 194, 209, 369-370 in police  ... 
doi:10.5860/choice.35-6456 fatcat:zlca7qql2ffevobnzs5qckmyqq

Dagstuhl Reports, Volume 10, Issue 1, January 2020, Complete Issue

2020
We then propose several directions of interest. Firstly we point out the similarity of DECK function and multi-forkcipher security notions, and propose to study their relation.  ...  Oliver Stein for his remarks on constraint feasibility. Participants Richard -Symmetric Cryptography model in the original submission.  ...  Symmetric Primitives Optimized for Integrity Proof Systems", IACR Cryptol. ePrint Arch., Vol. 2020, p. 188, 2020.  ... 
doi:10.4230/dagrep.10.1 fatcat:bcgvzpofpfdsfapuhkstc6teyi