Pages that link to "Item:Q5458592"
From MaRDI portal
The following pages link to On the Indifferentiability of the Sponge Construction (Q5458592):
Displayed 50 items.
- How to build an ideal cipher: the indifferentiability of the Feistel construction (Q271585) (← links)
- Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier (Q293718) (← links)
- Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour (Q306057) (← links)
- An analysis of the blockcipher-based hash functions from PGV (Q604636) (← links)
- Preimage resistance of \(\mathsf{LP}mkr\) with \(r=m-1\) (Q765490) (← links)
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- Algebraic key-recovery attacks on reduced-round Xoofff (Q832336) (← links)
- Open problems in hash function security (Q887443) (← links)
- A measure of dependence for cryptographic primitives relative to ideal functions (Q888120) (← links)
- Improved domain extender for the ideal cipher (Q892511) (← links)
- Static-memory-hard functions, and modeling the cost of space vs. time (Q1629397) (← links)
- Classical proofs for the quantum collapsing property of classical hash functions (Q1631333) (← links)
- LWDSA: light-weight digital signature algorithm for wireless sensor networks (Q1637662) (← links)
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method (Q1648806) (← links)
- Hold your breath, PRIMATEs are lightweight (Q1698631) (← links)
- New second preimage attacks on dithered hash functions with low memory complexity (Q1698640) (← links)
- A robust and sponge-like PRNG with improved efficiency (Q1698655) (← links)
- Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes (Q1726666) (← links)
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives (Q1746961) (← links)
- Signcryption schemes with insider security in an ideal permutation model (Q2003346) (← links)
- The Oribatida v1.3 family of lightweight authenticated encryption schemes (Q2040556) (← links)
- Security of the Poseidon hash function against non-binary differential and linear attacks (Q2044012) (← links)
- \textsc{Ascon} v1.2: lightweight authenticated encryption and hashing (Q2044758) (← links)
- Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli} (Q2051403) (← links)
- Mind the composition: birthday bound attacks on EWCDMD and SoKAC21 (Q2055608) (← links)
- Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\) (Q2056692) (← links)
- Compactness of hashing modes and efficiency beyond Merkle tree (Q2056724) (← links)
- Leakage resilient value comparison with application to message authentication (Q2056738) (← links)
- Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance (Q2061937) (← links)
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems (Q2102068) (← links)
- Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff (Q2232120) (← links)
- An observation on NORX, BLAKE2, and ChaCha (Q2274480) (← links)
- Troika: a ternary cryptographic hash function (Q2285779) (← links)
- Beyond conventional security in sponge-based authenticated encryption modes (Q2318091) (← links)
- Optimizing a password hashing function with hardware-accelerated symmetric encryption (Q2337862) (← links)
- Quark: a lightweight hash (Q2377065) (← links)
- Security of permutation-based compression function {\textsf{lp}}231 (Q2446596) (← links)
- Whirlwind: a new cryptographic hash function (Q2638401) (← links)
- A review of quantum and hybrid quantum/classical blockchain protocols (Q2677258) (← links)
- New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions (Q2692336) (← links)
- An algebraic attack on ciphers with low-degree round functions: application to full MiMC (Q2692352) (← links)
- How to Incorporate Associated Data in Sponge-Based Authenticated Encryption (Q2790052) (← links)
- On the XOR of Multiple Random Permutations (Q2794522) (← links)
- Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts (Q2807225) (← links)
- Forgery Attacks on Round-Reduced ICEPOLE-128 (Q2807228) (← links)
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees (Q2835583) (← links)
- Indifferentiability of 8-Round Feistel Networks (Q2835584) (← links)
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications (Q2889879) (← links)
- Analysis of NORX: Investigating Differential and Rotational Properties (Q2946482) (← links)
- Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials (Q2946880) (← links)