Better concrete security for half-gates garbling (in the multi-instance setting)

C Guo, J Katz, X Wang, C Weng, Y Yu - Annual International Cryptology …, 2020 - Springer
We study the concrete security of high-performance implementations of half-gates garbling,
which all rely on (hardware-accelerated) AES. We find that current instantiations using k-bit …

Open problems in hash function security

E Andreeva, B Mennink, B Preneel - Designs, Codes and Cryptography, 2015 - Springer
A cryptographic hash function compresses arbitrarily long messages to digests of a short
and fixed length. Most of existing hash functions are designed to evaluate a compression …

Block-cipher-based tree hashing

A Gunsing - Annual International Cryptology Conference, 2022 - Springer
First of all we take a thorough look at an error in a paper by Daemen et al.(ToSC 2018)
which looks at minimal requirements for tree-based hashing based on multiple primitives …

Formal Algebraic Reasoning About Compression Function Security

Z Javar - 2024 - dspace.library.uvic.ca
Cryptographic hash functions are fundamental in cryptographic constructions, as they
transform variable-length input into fixed-length output while maintaining essential security …

[PDF][PDF] In the name of God

SHS Bagheri - architecture, 2019 - sru.ac.ir
Arash Talebi Page 1 Curriculum Vitae
_____________________________________________ Nasour Bagheri Page 1 of 7 In …