[图书][B] Bent functions: results and applications to cryptography

N Tokareva - 2015 - books.google.com
Bent Functions: Results and Applications to Cryptography offers a unique survey of the
objects of discrete mathematics known as Boolean bent functions. As these maximal …

[PDF][PDF] Applications of evolutionary computation to cryptology

S Picek - 2015 - repository.ubn.ru.nl
Untitled Page 1 Page 2 Page 3 Applications of Evolutionary Computation to Cryptology
Stjepan Picek Page 4 Copyright c Stjepan Picek, 2015 ISBN: 978-94-6295-238-6 IPA …

Vector Boolean Functions: applications in symmetric cryptography

JA Álvarez Cubero - 2015 - oa.upm.es
Esta tesis establece los fundamentos teóricos y diseña una colección abierta de clases C++
denominada VBF (Vector Boolean Functions) para analizar funciones booleanas vectoriales …

Minimal sign representation of boolean functions: algorithms and exact results for low dimensions

CE Sezener, E Oztop - Neural Computation, 2015 - ieeexplore.ieee.org
Boolean functions (BFs) are central in many fields of engineering and mathematics, such as
cryptography, circuit design, and combinatorics. Moreover, they provide a simple framework …

WHIRLBOB, the Whirlpool Based Variant of STRIBOB: Lighter, Faster, and Constant Time

MJO Saarinen, BB Brumley - Secure IT Systems: 20th Nordic Conference …, 2015 - Springer
WHIRLBOB, also known as STRIBOBr2, is an AEAD (Authenticated Encryption with
Associated Data) algorithm derived from STRIBOBr1 and the Whirlpool hash algorithm …

Fixed point attack in PGV-5 scheme using SIMON algorithm

YSS Risqi, S Yohanes, S Windarta - Procedia Computer Science, 2015 - Elsevier
Block cipher-based hash function is a hash function that is constructed by applying a block
cipher algorithm on a scheme to form a hash algorithm. So that the strength of the block …

Side channel cryptanalysis of Streebog

G Sekar - … : Second International Conference, SSR 2015, Tokyo …, 2015 - Springer
Streebog is the cryptographic hash function standard of the Russian Federation. It comprises
two hash functions corresponding to two digest sizes, 256 bits and 512 bits. This paper …

Collision Attack on Grindahl

T Peyrin - Journal of Cryptology, 2015 - Springer
Hash functions have been among the most scrutinized cryptographic primitives in the
previous decade, mainly due to the cryptanalysis breakthroughs on MD-SHA family and the …

An elliptic curve algorithm for iris pattern recognition

SV Vishnubhatla - 2015 Annual Global Online Conference on …, 2015 - ieeexplore.ieee.org
This paper presents an iris recognition system with a self-developed elliptic curve algorithm
or hash. The system was written in Python with the OpenCV library. This iris recognition …

[PDF][PDF] Vector Boolean Functions: Applications in Symmetric Cryptography

JAÁ Cubero - 2015 - oa.upm.es
This thesis develops the theoretical foundations and designs an open collection of C++
classes, called VBF, designed for analyzing vector Boolean functions (functions that map a …