This book offers a comprehensive introduction to the fundamental aspects of Information Security (including Web, Networked World, Systems, Applications, and Communication …
Many cryptographic primitives that are used in cryptographic schemes and security protocols such as SET, PKI, IPSec, and VPNs utilize hash functions, which form a special family of …
This paper advocates a new hash function family based on the HAIFA framework, inheriting built-in randomized hashing and higher security guarantees than the Merkle-Damgård …
J Swoboda, M Pramateftakis, S Spitz, J Swoboda - 2008 - Springer
Dieses Buch entstand auf der Basis von Vorlesungen über Kryptographie und angewandte IT-Sicherheit, die seit Jahren in der Elektrotechnik und Informationstechnik (EI) der …
T Schneider - Informatiktage, 2008 - download.hrz.tu-darmstadt.de
This thesis focuses on practical aspects of general two-party Secure Function Evaluation (SFE). We give a new SFE protocol that allows free evaluation of XOR gates and is provably …
M Knezzevic, K Sakiyama, YK Lee… - 2008 International …, 2008 - ieeexplore.ieee.org
In this paper we present two new architectures of the RIPEMD-160 hash algorithm for high throughput implementations. The first architecture achieves the iteration bound of RIPEMD …
Je souhaite adresser mes premiers remerciements à Henri Gilbert, qui a accepté de m'encadrer tout au long de mon travail de recherche. Son amabilité, sa patience et sa …
Cryptographic algorithms are ubiquitous in modern communication systems where they have a central role in ensuring information security. This thesis studies efficient …
Synchronous stream ciphers constitute an important class of symmetric ciphers. After the call of the eSTREAM project in 2004, 34 stream ciphers with different design approaches were …