Sponge-Based Pseudo-Random Number Generators

From MaRDI portal
Revision as of 03:05, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3583439

DOI10.1007/978-3-642-15031-9_3zbMath1297.94050OpenAlexW1539249970MaRDI QIDQ3583439

Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche

Publication date: 17 August 2010

Published in: Cryptographic Hardware and Embedded Systems, CHES 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-15031-9_3





Related Items (23)

Duplexing the Sponge: Single-Pass Authenticated Encryption and Other ApplicationsQuark: a lightweight hashLWDSA: light-weight digital signature algorithm for wireless sensor networksOn forging SPHINCS\textsuperscript{+}-Haraka signatures on a fault-tolerant quantum computersp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained DevicesGeneric attack on duplex-based AEAD modes using random function statisticsAn accurate, scalable and verifiable protocol for federated differentially private averagingBlock-cipher-based tree hashingDesigning tweakable enciphering schemes using public permutationsA robust and sponge-like PRNG with improved efficiencyNew results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisionsPublic-Seed Pseudorandom PermutationsAn observation on NORX, BLAKE2, and ChaChaTroika: a ternary cryptographic hash functionFarasha: a provable permutation-based parallelizable PRFDesigning full-rate \textsf{Sponge} based AEAD modesSecurity analysis of the ISO standard \textsf{OFB}-\textsf{DRBG}\textsc{Ascon} v1.2: lightweight authenticated encryption and hashingImproved practical attacks on round-reduced KeccakInternal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli}Beyond conventional security in sponge-based authenticated encryption modesSecurity analysis of NIST CTR-DRBGOut of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems







This page was built for publication: Sponge-Based Pseudo-Random Number Generators