This paper introduces a new cryptographic library, NaCl, and explains how the design and implementation of the library avoid various types of cryptographic disasters suffered by …
M Leone, EE Caprella - US Patent 8,296,825, 2012 - Google Patents
A system for enabling a user to communicate on a virtual private network through a public communication network, the possibility of communicating on the private network depending …
Problem statement: The main goal guiding the design of any encryption algorithm needs to be secured against unauthorized attacks. For all applied applications, performance and the …
C Ohtahara, Y Sasaki, T Shimoyama - IEICE Transactions on …, 2012 - search.ieice.org
In this paper, we present the first results on the preimage resistance against step-reduced versions of ISO standard hash functions RIPEMD-128 and RIPEMD-160, which were …
In this work, we provide the first security analysis of reduced RIPEMD-160 regarding its collision resistance with practical complexity. The ISO/IEC standard RIPEMD-160 was …
In this paper, we analyze the security of RIPEMD-128 against collision attacks. The ISO/IEC standard RIPEMD-128 was proposed 15 years ago and may be used as a drop-in …
Security is considered the most important requirement for the success of electronic commerce, which is built based on the security of hash functions, encryption algorithms and …
Y Sasaki, L Wang - Applied Cryptography and Network Security: 10th …, 2012 - Springer
This paper presents differential-based distinguishers against ISO standard hash functions RIPEMD-128 and RIPEMD-160. Second-order differential paths are constructed on reduced …