Quantum collision attacks on reduced SHA-256 and SHA-512

A Hosoyamada, Y Sasaki - Annual International Cryptology Conference, 2021 - Springer
In this paper, we study dedicated quantum collision attacks on SHA-256 and SHA-512 for
the first time. The attacks reach 38 and 39 steps, respectively, which significantly improve the …

Orthros: a low-latency PRF

S Banik, T Isobe, F Liu, K Minematsu… - IACR Transactions on …, 2021 - tosc.iacr.org
We present Orthros, a 128-bit block pseudorandom function. It is designed with primary
focus on latency of fully unrolled circuits. For this purpose, we adopt a parallel structure …

Embedded LUKS (E-LUKS): a hardware solution to IoT security

G Cano-Quiveu, P Ruiz-de-clavijo-Vazquez, MJ Bellido… - Electronics, 2021 - mdpi.com
The Internet of Things (IoT) security is one of the most important issues developers have to
face. Data tampering must be prevented in IoT devices and some or all of the confidentiality …

A proposal for data authentication, data integrity and replay attack rejection for the LIN bus

F Páez, H Kaschel - 2021 IEEE CHILEAN Conference on …, 2021 - ieeexplore.ieee.org
Today's most relevant in-vehicle communication buses (CAN, LIN, FlexRay) offer no
standard cybersecurity features, being highly vulnerable to local and remote cyberattacks …

[PDF][PDF] Design and implementation of a strong and secure lightweight cryptographic hash algorithm using elliptic curve concept: SSLHA-160

BP Kosta, PS Naidu - International Journal of Advanced …, 2021 - pdfs.semanticscholar.org
Cryptographic hash function assumes a fundamental job in numerous pieces of
cryptographic algorithm and conventions, particularly in authentication, non-repudiation and …

Self-sovereign identity management in wireless ad hoc mesh networks

M Grabatin, W Hommel - 2021 IFIP/IEEE International …, 2021 - ieeexplore.ieee.org
Verifying the identity of nodes within a wireless ad hoc mesh network and the authenticity of
their messages in sufficiently secure, yet power-efficient ways is a long-standing challenge …

HORSIC+: an efficient post-quantum few-time signature scheme

J Lee, Y Park - Applied Sciences, 2021 - mdpi.com
It is well known that conventional digital signature algorithms such as RSA and ECDSA are
vulnerable to quantum computing attacks. Hash-based signature schemes are attractive as …

Cryptographic Hashes

W Easttom, W Easttom - Modern Cryptography: Applied Mathematics for …, 2021 - Springer
Cryptographic hashes are utilized for many purposes, the most common is data integrity.
The nature of a hash makes it an excellent tool for verifying message integrity. Hashes are …

[图书][B] Cryptography in the information society

B Ryabko, A Fionov - 2021 - World Scientific
Let us begin the study of cryptography with the classic problem of transmitting secret
messages from a sender A to a receiver B. Both the sender and the receiver may be …

Hashes

S Aggarwal, N Kumar - Advances in Computers, 2021 - Elsevier
Hashing is a method to store and retrieve records from a database. Anyone can insert,
delete, and search for records based on a search key value. When hashes are implemented …