Edindex: Enabling fast data queries in edge storage systems

Q He, S Tan, F Chen, X Xu, L Qi, X Hei, H **… - Proceedings of the 46th …, 2023 - dl.acm.org
In an edge storage system, popular data can be stored on edge servers to enable low-
latency data retrieval for nearby users. Suffering from constrained storage capacities, edge …

Quantum collision attacks on reduced SHA-256 and SHA-512

A Hosoyamada, Y Sasaki - Annual International Cryptology Conference, 2021 - Springer
In this paper, we study dedicated quantum collision attacks on SHA-256 and SHA-512 for
the first time. The attacks reach 38 and 39 steps, respectively, which significantly improve the …

Analysis of SHA-512/224 and SHA-512/256

C Dobraunig, M Eichlseder, F Mendel - … on the Theory and Application of …, 2015 - Springer
Abstract In 2012, NIST standardized SHA-512/224 and SHA-512/256, two truncated variants
of SHA-512, in FIPS 180-4. These two hash functions are faster than SHA-224 and SHA-256 …

Improving local collisions: new attacks on reduced SHA-256

F Mendel, T Nad, M Schläffer - … on the Theory and Applications of …, 2013 - Springer
In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and
show how to turn them into collisions. We present a collision attack on 28 steps of the hash …

Analysis of differential attacks in ARX constructions

G Leurent - Advances in Cryptology–ASIACRYPT 2012: 18th …, 2012 - Springer
In this paper, we study differential attacks against ARX schemes. We build upon the
generalized characteristics of de Cannière and Rechberger; we introduce new multi-bit …

Efficient data placement and retrieval services in edge computing

J **e, C Qian, D Guo, X Li, S Shi… - 2019 IEEE 39th …, 2019 - ieeexplore.ieee.org
Edge computing is a new paradigm in which the computing and storage resources are
placed at the edge of the Internet. Data placement and retrieval are fundamental services of …

Efficient indexing mechanism for unstructured data sharing systems in edge computing

J **e, C Qian, D Guo, M Wang, S Shi… - IEEE INFOCOM 2019 …, 2019 - ieeexplore.ieee.org
Edge computing promises a dramatic reduction in the network latency and the traffic volume,
where many edge servers are placed at the edge of the Internet. Furthermore, these edge …

COIN: An efficient indexing mechanism for unstructured data sharing systems

J **e, C Qian, D Guo, M Wang… - … /ACM Transactions on …, 2021 - ieeexplore.ieee.org
Edge computing promises a dramatic reduction in the network latency and the traffic volume,
where many edge servers are placed at the edge of the Internet. Furthermore, those edge …

New Records in Collision Attacks on SHA-2

Y Li, F Liu, G Wang - Annual International Conference on the Theory and …, 2024 - Springer
The SHA-2 family including SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224 and
SHA512/256 is a US federal standard published by NIST. Especially, there is no doubt that …

Security and practical considerations when implementing the elliptic curve integrated encryption scheme

V Gayoso Martínez, L Hernández Encinas… - Cryptologia, 2015 - Taylor & Francis
The most popular encryption scheme based on elliptic curves is the Elliptic Curve Integrated
Encryption Scheme (ECIES), which is included in ANSI X9. 63, IEEE 1363a, ISO/IEC 18033 …