[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

Fast message franking: From invisible salamanders to encryptment

Y Dodis, P Grubbs, T Ristenpart, J Woodage - Advances in Cryptology …, 2018 - Springer
Message franking enables cryptographically verifiable reporting of abusive messages in end-
to-end encrypted messaging. Grubbs, Lu, and Ristenpart recently formalized the needed …

MARVELlous: a STARK-friendly family of cryptographic primitives

T Ashur, S Dhooghe - Cryptology ePrint Archive, 2018 - eprint.iacr.org
The ZK-STARK technology, published by Ben-Sasson et al. in ePrint 2018/046 is hailed by
many as being a viable, efficient solution to the scaling problem of cryptocurrencies. In …

On the similarities between blockchains and merkle-damgård hash functions

K Halunen, V Vallivaara… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Blockchain as a new technology has created a great amount of hype and hope for different
applications. There is a promise of a better, decentralised trust based on strict guarantees …

Sound hashing modes of arbitrary functions, permutations, and block ciphers

J Daemen, B Mennink, G Van Assche - IACR Transactions on …, 2018 - tosc.iacr.org
Cryptographic hashing modes come in many flavors, including Merkle-Damgård with
various types of strengthening, Merkle trees, and sponge functions. As underlying primitives …

Enhancing e-banking security: using whirlpool hash function for card number encryption

DY Khudhur, SS Hameed, SM Al-Barzinji - 2018 - 194.127.137.90
The Internet played-and still-the key that continuously changing our ways of interaction with
people. As a result, several electronic services had emerged allowing businesses to grow by …

Key management in tree shaped hierarchies

L Lopriore - Information Security Journal: A Global Perspective, 2018 - Taylor & Francis
We refer to an access control system based on subjects and objects. Subjects are active
entities, eg processes, while objects are passive entities, eg messages exchanged between …

[PDF][PDF] Differential Cryptanalysis of Symmetric Primitives

M Eichlseder - 2018 - graz.elsevierpure.com
We cryptanalyze several symmetric encryption and hashing algorithms. A central factor in
the security of symmetric cryptographic algorithms is the resistance of their core building …

Access right management by extended password capabilities

L Lopriore - International Journal of Information Security, 2018 - Springer
With reference to a classic protection system featuring active subjects that reference
protected objects, we approach the problem of identifying the objects that each subject can …

Preimage Attacks on Some Hashing Modes Instantiating Reduced-Round LBlock

S Chen, C Jin - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, we present preimage attacks on several hashing modes instantiating reduced-
round LBlock. It is observed that the omission of the network twist in the last round and the …