The Poly1305-AES message-authentication code

DJ Bernstein - International workshop on fast software encryption, 2005 - Springer
Poly1305-AES is a state-of-the-art message-authentication code suitable for a wide variety
of applications. Poly1305-AES computes a 16-byte authenticator of a variable-length …

NEON crypto

DJ Bernstein, P Schwabe - … and Embedded Systems–CHES 2012: 14th …, 2012 - Springer
NEON is a vector instruction set included in a large fraction of new ARM-based tablets and
smartphones. This paper shows that NEON supports high-security cryptography at …

EWCDM: an efficient, beyond-birthday secure, nonce-misuse resistant MAC

B Cogliati, Y Seurin - Annual International Cryptology Conference, 2016 - Springer
We propose a nonce-based MAC construction called EWCDM (Encrypted Wegman-Carter
with Davies-Meyer), based on an almost xor-universal hash function and a block cipher, with …

Preparing a commercial quantum key distribution system for certification against implementation loopholes

V Makarov, A Abrikosov, P Chaiwongkhot… - Physical Review …, 2024 - APS
A commercial quantum key distribution (QKD) system needs to be formally certified to
enable its wide deployment. The certification should include the system's robustness against …

[PDF][PDF] Packet-level caching for information-centric networking

S Arianfar, P Nikander, J Ott - ACM SIGCOMM, ReArch Workshop, 2010 - users.piuha.net
Within the current Internet architecture, adding fully efficient in-network packet caches is not
easily doable. Packets are defined only in the context of transport level flows and are not …

Lightweight authentication for quantum key distribution

EO Kiktenko, AO Malyshev, MA Gavreev… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Quantum key distribution (QKD) enables unconditionally secure communication between
distinct parties using a quantum channel and an authentic public channel. Reducing the …

Post-processing procedure for industrial quantum key distribution systems

E Kiktenko, A Trushechkin, Y Kurochkin… - Journal of Physics …, 2016 - iopscience.iop.org
We present algorithmic solutions aimed on post-processing procedure for industrial
quantum key distribution systems with hardware sifting. The main steps of the procedure are …

Demonstration of a quantum key distribution network in urban fibre-optic communication lines

EO Kiktenko, NO Pozhar, AV Duplinskiy… - Quantum …, 2017 - iopscience.iop.org
We report the results of the implementation of a quantum key distribution (QKD) network
using standard fibre communication lines in Moscow. The developed QKD network is based …

Efficient integration of rate-adaptive reconciliation with syndrome-based error estimation and subblock confirmation for quantum key distribution

P Treeviriyanupab, CM Zhang - Entropy, 2024 - mdpi.com
An effective post-processing algorithm is essential for achieving high rates of secret key
generation in quantum key distribution. This work introduces an approach to quantum key …

SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields

JP Degabriele, J Gilcher, J Govinden… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Poly1305 is a widely-deployed polynomial hash function. The rationale behind its design
was laid out in a series of papers by Bernstein, the last of which dates back to 2005. As …