Search Results - "Atul Luykx"
-
1
The COLM Authenticated Encryption Scheme
Published in Journal of cryptology (01-04-2024)“…In this work we present the COLM authenticated encryption (AE) scheme which is the second of the two winners in the defense in depth category of the CAESAR…”
Get full text
Journal Article -
2
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things
Published in IACR Transactions on Symmetric Cryptology (01-01-2018)“…Lightweight cryptography was developed in response to the increasing need to secure devices for the Internet of Things. After significant research effort, many…”
Get full text
Journal Article -
3
Understanding RUP Integrity of COLM
Published in IACR Transactions on Symmetric Cryptology (01-06-2017)“…The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of…”
Get full text
Journal Article -
4
Security Analysis of BLAKE2’s Modes of Operation
Published in IACR Transactions on Symmetric Cryptology (01-12-2016)“…BLAKE2 is a hash function introduced at ACNS 2013, which has been adopted in many constructions and applications. It is a successor to the SHA-3 finalist…”
Get full text
Journal Article -
5
Efficient Length Doubling From Tweakable Block Ciphers
Published in IACR Transactions on Symmetric Cryptology (01-09-2017)“…We present a length doubler, LDT, that turns an n-bit tweakable block cipher into an efficient and secure cipher that can encrypt any bit string of length…”
Get full text
Journal Article -
6
Two-permutation-based hashing with binary mixing
Published in Journal of mathematical cryptology (01-10-2015)“…We consider the generic design of compression functions based on two n-bit permutations and XOR-based mixing functions. It is known that any such function…”
Get full text
Journal Article -
7
Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
Published in Journal of cryptology (15-07-2019)“…The Sponge function is known to achieve 2 c / 2 security, where c is its capacity. This bound was carried over to its keyed variants, such as SpongeWrap, to…”
Get full text
Journal Article -
8
Systematic Security Analysis of Stream Encryption With Key Erasure
Published in IEEE transactions on information theory (01-11-2021)“…We consider a generalized construction of stream ciphers with forward security. The design framework is modular: it is built from a so-called layer function…”
Get full text
Journal Article -
9
Connecting tweakable and multi-key blockcipher security
Published in Designs, codes, and cryptography (01-03-2018)“…The significance of understanding blockcipher security in the multi-key setting is highlighted by the extensive literature on attacks, and how effective key…”
Get full text
Journal Article -
10
Security Analysis of BLAKE2’s Modes of Operation
Published in IACR Transactions on Symmetric Cryptology (01-12-2016)“…BLAKE2 is a hash function introduced at ACNS 2013, which has been adopted in many constructions and applications. It is a successor to the SHA-3 finalist…”
Get full text
Journal Article -
11
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things
Published in IACR Transactions on Symmetric Cryptology (03-09-2018)“…Lightweight cryptography was developed in response to the increasing need to secure devices for the Internet of Things. After significant research effort, many…”
Get full text
Journal Article -
12
The Hashgraph Protocol: Efficient Asynchronous BFT for High-Throughput Distributed Ledgers
Published in 2020 International Conference on Omni-layer Intelligent Systems (COINS) (01-08-2020)“…Atomic broadcast protocols are increasingly used to build distributed ledgers. The most robust protocols achieve byzantine fault tolerance (BFT) and operate in…”
Get full text
Conference Proceeding -
13
Efficient Length Doubling From Tweakable Block Ciphers
Published in IACR Transactions on Symmetric Cryptology (19-09-2017)“…We present a length doubler, LDT, that turns an n-bit tweakable block cipher into an efficient and secure cipher that can encrypt any bit string of length…”
Get full text
Journal Article -
14
Understanding RUP Integrity of COLM
Published in IACR Transactions on Symmetric Cryptology (19-06-2017)“…The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of…”
Get full text
Journal Article