Security analysis of SHA-256 and sisters
This paper studies the security of SHA-256, SHA-384 and SHA-512 against collision attacks
and provides some insight into the security properties of the basic building blocks of the …
and provides some insight into the security properties of the basic building blocks of the …
[KSIĄŻKA][B] New dimensions of information warfare
Since the dawn of Humanity, the progress machine tirelessly introduced tools and resources
that facilitated our everyday tasks. Over the years, new technologies have continually …
that facilitated our everyday tasks. Over the years, new technologies have continually …
Hash functions and RFID tags: Mind the gap
The security challenges posed by RFID-tag deployments are well-known. In response there
is a rich literature on new cryptographic protocols and an on-tag hash function is often …
is a rich literature on new cryptographic protocols and an on-tag hash function is often …
Energy comparison of AES and SHA-1 for ubiquitous computing
Wireless sensor networks and Radio Frequency Identifiers are becoming mainstream
applications of ubiquitous computing. They are slowly being integrated into our infrastructure …
applications of ubiquitous computing. They are slowly being integrated into our infrastructure …
Bio-inspired cryptosystem with DNA cryptography and neural networks
Abstract Bio-Inspired Cryptosystems are a modern form of Cryptography where bio-inspired
and machine learning techniques are used for the purpose of securing data. A system has …
and machine learning techniques are used for the purpose of securing data. A system has …
[PDF][PDF] Cryptography for ultra-low power devices
JPE Kaps - 2006 - digital.wpi.edu
Ubiquitous computing describes the notion that computing devices will be everywhere:
clothing, walls and floors of buildings, cars, forests, deserts, etc. Ubiquitous computing is …
clothing, walls and floors of buildings, cars, forests, deserts, etc. Ubiquitous computing is …
Randomly failed! The state of randomness in current Java implementations
LNCS 7779 - Randomly Failed! The State of Randomness in Current Java Implementations
Page 1 Randomly Failed! The State of Randomness in Current Java Implementations Kai …
Page 1 Randomly Failed! The State of Randomness in Current Java Implementations Kai …
On the impossibility of highly-efficient blockcipher-based hash functions
Fix a small, non-empty set of blockcipher keys \mathcalK. We say a blockcipher-based hash
function is highly-efficient if it makes exactly one blockcipher call for each message block …
function is highly-efficient if it makes exactly one blockcipher call for each message block …
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
ARX algorithms are a class of symmetric-key algorithms constructed by Addition, Rotation,
and XOR. To evaluate the resistance of an ARX cipher against differential and impossible …
and XOR. To evaluate the resistance of an ARX cipher against differential and impossible …
Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA)
A Ranea, V Rijmen - IET Information Security, 2022 - Wiley Online Library
Automated search methods based on Satisfiability Modulo Theory (SMT) problems are
being widely used to evaluate the security of block ciphers against distinguishing attacks …
being widely used to evaluate the security of block ciphers against distinguishing attacks …