Hash-based cryptography

Results: 78



#Item
21SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-08-04 11:34:10
22The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-07-24 05:23:52
23SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2014-10-04 10:08:48
24draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based Signatures

draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based Signatures

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-04-08 10:22:54
251  Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks Attila Altay Yavuz and Peng Ning

1 Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks Attila Altay Yavuz and Peng Ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:12
26Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks Qi Dong Donggang Liu∗  Peng Ning†

Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks Qi Dong Donggang Liu∗ Peng Ning†

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:21
27MYK-85 Key Management Unit A complete, 32-bit RISC-based cryptographic processor with Baton, DES, and Triple DES in

MYK-85 Key Management Unit A complete, 32-bit RISC-based cryptographic processor with Baton, DES, and Triple DES in

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:38
28More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

More Insights on Blockcipher-Based Hash Functions Yiyuan Luo, Xuejia Lai Department of Computer Science and Engineering, Shanghai Jiaotong University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-15 23:12:24
29Permutation-based symmetric cryptography and Keccak  Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Permutation-based symmetric cryptography and Keccak Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-02 17:23:46
30A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions∗ Zheng Gong, Xuejia Lai and Kefei Chen Department of Computer Science and Engineering Shanghai Jiaotong University, China neoyan@sjtu.e

A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions∗ Zheng Gong, Xuejia Lai and Kefei Chen Department of Computer Science and Engineering Shanghai Jiaotong University, China neoyan@sjtu.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-08-12 04:16:52