R Bost, B Minaud, O Ohrimenko - … of the 2017 ACM SIGSAC Conference …, 2017 - dl.acm.org
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can securely outsource a database to an untrusted server, in such a way that the database can …
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
Zero-knowledge (ZK) applications form a large group of use cases in modern cryptography, and recently gained in popularity due to novel proof systems. For many of these …
This is the second edition of Understanding Cryptography. Ever since we released the first edition in 2009, we have been humbled by the many positive responses we received from …
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but …
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
JS Coron, Y Dodis, C Malinaud, P Puniya - Advances in Cryptology …, 2005 - Springer
The most common way of constructing a hash function (eg, SHA-1) is to iterate a compression function on the input message. The compression function is usually designed …
H Dobbertin, A Bosselaers, B Preneel - International Workshop on Fast …, 1996 - Springer
Cryptographic hash functions are an important tool in cryptography for applications such as digital fingerprinting of messages, message authentication, and key derivation. During the …
Abstract Preneel, Govaerts, and Vandewalle [6] considered the 64 most basic ways to construct a hash function H:(0, 1)*→(0, 1) n from a block cipher E:(0, 1) n×(0, 10 n→(0, 1) n …