FAST: disk encryption and beyond

D Chakraborty, S Ghosh, CM López… - Cryptology ePrint …, 2017 - eprint.iacr.org
This work introduces\sym {FAST} which is a new family of tweakable enciphering schemes.
Several instantiations of\sym {FAST} are described. These are targeted towards two goals …

Encryption schemes secure under related-key and key-dependent message attacks

F Böhl, GT Davies, D Hofheinz - Public-Key Cryptography–PKC 2014: 17th …, 2014 - Springer
We construct secret-key encryption (SKE) schemes that are secure against related-key
attacks and in the presence of key-dependent messages (RKA-KDM secure). We emphasize …

[HTML][HTML] Random multiple key streams for encryption with added CBC mode of operation

P Penchalaiah, KR Reddy - Perspectives in Science, 2016 - Elsevier
There are many cryptographic systems that use complex operations involving substitutions
and permutations to produce resistant ciphertext, even if the level of the security of these …

KDM security in the hybrid framework

GT Davies, M Stam - Topics in Cryptology–CT-RSA 2014: The …, 2014 - Springer
We study the natural question of how well suited the hybrid encryption paradigm is in the
context of key-dependent message (KDM) attacks. We prove that if a key derivation function …

Practical collision attack on 40-step RIPEMD-128

G Wang - Topics in Cryptology–CT-RSA 2014: The …, 2014 - Springer
Abstract RIPEMD-128 is an ISO/IEC standard cryptographic hash function proposed in 1996
by Dobbertin, Bosselaers and Preneel. The compression function of RIPEMD-128 consists …

[PDF][PDF] Secure and cost effective cryptosystem design based on random multiple key streams

P Padugupati, KR Reddy - J. Inf. Secur. Res, 2016 - dline.info
There are many cryptographic systems that use complex operations involving substitutions
and permutations to produce resistant ciphertext, even if the level of the security of these …

[PDF][PDF] Studies on Disk Encryption

CM López - 2013 - cimat.mx
The problem of disk encryption is to encrypt bulk information stored in a storage media like
hard disk, flash memory, CD or DVD. The nature of storage media dictates the type of …

RKA-KDM secure encryption from public-key encryption

F Böhl, GT Davies, D Hofheinz - Cryptology ePrint Archive, 2013 - eprint.iacr.org
We construct secret-key encryption (SKE) schemes that are secure against related-key
attacks and in the presence of key-dependent messages (RKA-KDM secure). We emphasize …

Constructions and Analyses of Efficient Symmetric-Key Primitives for Authentication and Encryption

S Ghosh - 2021 - search.proquest.com
In symmetric key cryptography there are two fundamental objectives, viz. 1. confidentiality or
secrecy of message from unexpected party and 2. authentication of message which includes …

Try again. Fail again. Fail better: new notions of security, broken assumptions, and increased efficiency in cryptography

A Connolly - 2019 - theses.hal.science
This thesis presents new results addressing three fundamental areas of cryptography:
security notions, assumptions, and efficiency. The first part encompasses the security of …