Sponge-Based Pseudo-Random Number Generators
From MaRDI portal
Publication:3583439
DOI10.1007/978-3-642-15031-9_3zbMath1297.94050OpenAlexW1539249970MaRDI QIDQ3583439
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
Publication date: 17 August 2010
Published in: Cryptographic Hardware and Embedded Systems, CHES 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-15031-9_3
pseudo-random numbershash functionindifferentiabilitystream cipherKeccaksponge functionembedded security device
Related Items
Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications ⋮ Quark: a lightweight hash ⋮ LWDSA: light-weight digital signature algorithm for wireless sensor networks ⋮ On forging SPHINCS\textsuperscript{+}-Haraka signatures on a fault-tolerant quantum computer ⋮ sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices ⋮ Generic attack on duplex-based AEAD modes using random function statistics ⋮ An accurate, scalable and verifiable protocol for federated differentially private averaging ⋮ Block-cipher-based tree hashing ⋮ Designing tweakable enciphering schemes using public permutations ⋮ A robust and sponge-like PRNG with improved efficiency ⋮ New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions ⋮ Public-Seed Pseudorandom Permutations ⋮ An observation on NORX, BLAKE2, and ChaCha ⋮ Troika: a ternary cryptographic hash function ⋮ \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing ⋮ Improved practical attacks on round-reduced Keccak ⋮ Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli} ⋮ Beyond conventional security in sponge-based authenticated encryption modes ⋮ Security analysis of NIST CTR-DRBG ⋮ Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
This page was built for publication: Sponge-Based Pseudo-Random Number Generators