Edindex: Enabling fast data queries in edge storage systems
In an edge storage system, popular data can be stored on edge servers to enable low-
latency data retrieval for nearby users. Suffering from constrained storage capacities, edge …
latency data retrieval for nearby users. Suffering from constrained storage capacities, edge …
Quantum collision attacks on reduced SHA-256 and SHA-512
A Hosoyamada, Y Sasaki - Annual International Cryptology Conference, 2021 - Springer
In this paper, we study dedicated quantum collision attacks on SHA-256 and SHA-512 for
the first time. The attacks reach 38 and 39 steps, respectively, which significantly improve the …
the first time. The attacks reach 38 and 39 steps, respectively, which significantly improve the …
Analysis of SHA-512/224 and SHA-512/256
Abstract In 2012, NIST standardized SHA-512/224 and SHA-512/256, two truncated variants
of SHA-512, in FIPS 180-4. These two hash functions are faster than SHA-224 and SHA-256 …
of SHA-512, in FIPS 180-4. These two hash functions are faster than SHA-224 and SHA-256 …
Improving local collisions: new attacks on reduced SHA-256
In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and
show how to turn them into collisions. We present a collision attack on 28 steps of the hash …
show how to turn them into collisions. We present a collision attack on 28 steps of the hash …
Analysis of differential attacks in ARX constructions
G Leurent - Advances in Cryptology–ASIACRYPT 2012: 18th …, 2012 - Springer
In this paper, we study differential attacks against ARX schemes. We build upon the
generalized characteristics of de Cannière and Rechberger; we introduce new multi-bit …
generalized characteristics of de Cannière and Rechberger; we introduce new multi-bit …
Efficient data placement and retrieval services in edge computing
Edge computing is a new paradigm in which the computing and storage resources are
placed at the edge of the Internet. Data placement and retrieval are fundamental services of …
placed at the edge of the Internet. Data placement and retrieval are fundamental services of …
Efficient indexing mechanism for unstructured data sharing systems in edge computing
Edge computing promises a dramatic reduction in the network latency and the traffic volume,
where many edge servers are placed at the edge of the Internet. Furthermore, these edge …
where many edge servers are placed at the edge of the Internet. Furthermore, these edge …
COIN: An efficient indexing mechanism for unstructured data sharing systems
Edge computing promises a dramatic reduction in the network latency and the traffic volume,
where many edge servers are placed at the edge of the Internet. Furthermore, those edge …
where many edge servers are placed at the edge of the Internet. Furthermore, those edge …
New Records in Collision Attacks on SHA-2
Y Li, F Liu, G Wang - Annual International Conference on the Theory and …, 2024 - Springer
The SHA-2 family including SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224 and
SHA512/256 is a US federal standard published by NIST. Especially, there is no doubt that …
SHA512/256 is a US federal standard published by NIST. Especially, there is no doubt that …
Security and practical considerations when implementing the elliptic curve integrated encryption scheme
The most popular encryption scheme based on elliptic curves is the Elliptic Curve Integrated
Encryption Scheme (ECIES), which is included in ANSI X9. 63, IEEE 1363a, ISO/IEC 18033 …
Encryption Scheme (ECIES), which is included in ANSI X9. 63, IEEE 1363a, ISO/IEC 18033 …