Hash-function based PRFs: AMAC and its multi-user security

M Bellare, DJ Bernstein, S Tessaro - … on the Theory and Applications of …, 2016 - Springer
AMAC AMAC is a simple and fast candidate construction of a PRF from an MD-style hash
function which applies the keyed hash function and then a cheap, un-keyed output transform …

Linicrypt: a model for practical cryptography

B Carmer, M Rosulek - Advances in Cryptology–CRYPTO 2016: 36th …, 2016 - Springer
A wide variety of objectively practical cryptographic schemes can be constructed using only
symmetric-key operations and linear operations. To formally study this restricted class of …

Latin squares and their applications to cryptography

NO Schmidt - 2016 - scholarworks.boisestate.edu
A latin square of order-n is an nxn array over a set of n symbols such that every symbol
appears exactly once in each row and exactly once in each column. Latin squares encode …

Lightweight hashing using Lesamnta-LW compression function mode and MDP domain extension

A Akhimullah, S Hirose - 2016 Fourth International Symposium …, 2016 - ieeexplore.ieee.org
This paper presents a block-cipher-based hashing scheme suitable for resource constrained
devices. It uses the Lesamnta-LW compression function mode and the MDP domain …

Evolving s-boxes with reduced differential power analysis susceptibility

M Spain, M Varia - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Differential power analysis targets S-boxes to break ciphers that resist cryptanalysis. We
relax cryptanalytic constraints to lower S-box leakage, as quantified by the transparency …

[PDF][PDF] Cryptanalysis of some aes-based cryptographic primitives

R AlTawy - 2016 - spectrum.library.concordia.ca
Current information security systems rely heavily on symmetric key cryptographic primitives
as one of their basic building blocks. In order to boost the efficiency of the security systems …

Efficient parallelizable hashing using small non-compressing primitives

B Mennink, B Preneel - International Journal of Information Security, 2016 - Springer
A well-established method of constructing hash functions is to base them on non-
compressing primitives, such as one-way functions or permutations. In this work, we present …

Building indifferentiable compression functions from the PGV compression functions

P Gauravaram, N Bagheri, LR Knudsen - Designs, Codes and …, 2016 - Springer
Abstract Preneel, Govaerts and Vandewalle (PGV) analysed the security of single-block-
length block cipher based compression functions assuming that the underlying block cipher …

Chosen-key distinguishers on 12-round feistel-sp and 11-round collision attacks on its hashing modes

X Dong, X Wang - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Abstract Since Knudsen and Rijmen proposed the $ known $-$ key $ attacks in ASIACRYPT
2007, the $ open $-$ key $ model becomes more and more popular. As the other …

Access control lists in password capability environments

L Lopriore - Computers & Security, 2016 - Elsevier
With reference to a protection system featuring active subjects that attempt to access
passive, typed objects, we propose a set of mechanisms supporting the distribution …