11![Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India](https://www.pdfsearch.io/img/47a66a7221e7f98f5dbc273b40bb43c1.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-04-19 14:57:29
|
---|
12![A Keyed Sponge Construction with Pseudorandomness in the Standard Model A Keyed Sponge Construction with Pseudorandomness in the Standard Model](https://www.pdfsearch.io/img/33a132df5548050dcd3fa2e082206097.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-05-21 15:39:22
|
---|
13![A Keyed Sponge Construction with Pseudorandomness in the Standard Model A Keyed Sponge Construction with Pseudorandomness in the Standard Model](https://www.pdfsearch.io/img/57c8640c9b903b0951b821dea2e9c830.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-05-21 15:25:42
|
---|
14![Lightweight Sponge Stream F-FCSR f -function Analysis The GLUON family: a lightweight Hash function family based on FCSRs T. P. Berger1 , J. D’Hayer2 , K. Marquet2 , M. Minier2 , G. Thomas1 Lightweight Sponge Stream F-FCSR f -function Analysis The GLUON family: a lightweight Hash function family based on FCSRs T. P. Berger1 , J. D’Hayer2 , K. Marquet2 , M. Minier2 , G. Thomas1](https://www.pdfsearch.io/img/6a17384207f3bee42a6ae08b626d619d.jpg) | Add to Reading ListSource URL: www.aui.maLanguage: English - Date: 2012-07-13 06:37:48
|
---|
15![Sufficient conditions for sound tree and sequential hashing modes Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2 Sufficient conditions for sound tree and sequential hashing modes Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2](https://www.pdfsearch.io/img/50304f0dcbc7ca055bf4a247e195c974.jpg) | Add to Reading ListSource URL: sponge.noekeon.orgLanguage: English - Date: 2013-02-27 15:27:45
|
---|
16![A so ware interface for K In this note, we propose an interface to K at the level of the sponge and duplex constructions, and inside K at the level of the K - f permutation. The purpose is twofold. A so ware interface for K In this note, we propose an interface to K at the level of the sponge and duplex constructions, and inside K at the level of the K - f permutation. The purpose is twofold.](https://www.pdfsearch.io/img/de8ff21f276d678276fbd5ffc29b7e7c.jpg) | Add to Reading ListSource URL: keccak.noekeon.orgLanguage: English - Date: 2013-07-03 11:17:08
|
---|
17![Note on K parameters and usage The K sponge function family is characterized by three parameters: the bitrate r, the capacity c (where r + c is the width of the underlying permutation) and Note on K parameters and usage The K sponge function family is characterized by three parameters: the bitrate r, the capacity c (where r + c is the width of the underlying permutation) and](https://www.pdfsearch.io/img/3726d55212c9002eb971a32e994e68a2.jpg) | Add to Reading ListSource URL: keccak.noekeon.orgLanguage: English - Date: 2013-02-27 15:26:42
|
---|
18![Duplexing the sponge: single-pass authenticated encryption and other applications Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 Duplexing the sponge: single-pass authenticated encryption and other applications Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1](https://www.pdfsearch.io/img/da136c3c7adc1f854a9afa89c5643f33.jpg) | Add to Reading ListSource URL: sponge.noekeon.orgLanguage: English - Date: 2013-02-27 15:27:45
|
---|
19![Cryptographic sponge functions Guido B Cryptographic sponge functions Guido B](https://www.pdfsearch.io/img/eeb12c16076a312867f3a9ddf3396519.jpg) | Add to Reading ListSource URL: sponge.noekeon.orgLanguage: English - Date: 2013-02-27 15:27:45
|
---|