Sponge function

Results: 19



#Item
11Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
12A Keyed Sponge Construction with Pseudorandomness in the Standard Model

A Keyed Sponge Construction with Pseudorandomness in the Standard Model

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:39:22
13A Keyed Sponge Construction with Pseudorandomness in the Standard Model

A Keyed Sponge Construction with Pseudorandomness in the Standard Model

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:25:42
14Lightweight Sponge Stream F-FCSR f -function Analysis  The GLUON family: a lightweight Hash function family based on FCSRs T. P. Berger1 , J. D’Hayer2 , K. Marquet2 , M. Minier2 , G. Thomas1

Lightweight Sponge Stream F-FCSR f -function Analysis The GLUON family: a lightweight Hash function family based on FCSRs T. P. Berger1 , J. D’Hayer2 , K. Marquet2 , M. Minier2 , G. Thomas1

Add to Reading List

Source URL: www.aui.ma

Language: English - Date: 2012-07-13 06:37:48
15Sufficient conditions for sound tree and sequential hashing modes Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2

Sufficient conditions for sound tree and sequential hashing modes Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
16A so ware interface for K In this note, we propose an interface to K at the level of the sponge and duplex constructions, and inside K at the level of the K - f permutation. The purpose is twofold.

A so ware interface for K In this note, we propose an interface to K at the level of the sponge and duplex constructions, and inside K at the level of the K - f permutation. The purpose is twofold.

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-07-03 11:17:08
17Note on K  parameters and usage The K sponge function family is characterized by three parameters: the bitrate r, the capacity c (where r + c is the width of the underlying permutation) and

Note on K parameters and usage The K sponge function family is characterized by three parameters: the bitrate r, the capacity c (where r + c is the width of the underlying permutation) and

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:42
18Duplexing the sponge: single-pass authenticated encryption and other applications Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1

Duplexing the sponge: single-pass authenticated encryption and other applications Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
19Cryptographic sponge functions  Guido B

Cryptographic sponge functions Guido B

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45