Sponge function

Results: 19



#Item
11One-way function / Padding / Random oracle / Key encapsulation / Malleability / Feistel cipher / Chosen-ciphertext attack / Mihir Bellare / RSA / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
12Ute / Keccak / NIST hash function competition / Cryptographic hash functions

A Keyed Sponge Construction with Pseudorandomness in the Standard Model

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:39:22
13K1 / Tiny Encryption Algorithm / Block cipher / NIST hash function competition / Hash function / Merkle–Damgård construction / N-Hash / Cryptography / Cryptographic hash functions / Keccak

A Keyed Sponge Construction with Pseudorandomness in the Standard Model

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:25:42
14Stream ciphers / Pseudorandomness / Search algorithms / Hashing / F-FCSR / Hash function / Cryptographic hash function / Feedback with Carry Shift Registers / Pseudorandom generator theorem / Cryptography / Theoretical computer science / Applied mathematics

Lightweight Sponge Stream F-FCSR f -function Analysis The GLUON family: a lightweight Hash function family based on FCSRs T. P. Berger1 , J. D’Hayer2 , K. Marquet2 , M. Minier2 , G. Thomas1

Add to Reading List

Source URL: www.aui.ma

Language: English - Date: 2012-07-13 06:37:48
15Error detection and correction / Information retrieval / Artificial intelligence / Information science / Cryptography / Hash function / Merkle–Damgård construction / Hash tree / Tabulation hashing / Hashing / Cryptographic hash functions / Search algorithms

Sufficient conditions for sound tree and sequential hashing modes Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
16Data types / Primitive types / C++ / Keccak / NIST hash function competition / Pointer / C programming language / C++ classes / C / Computing / Computer programming / Software engineering

A so ware interface for K In this note, we propose an interface to K at the level of the sponge and duplex constructions, and inside K at the level of the K - f permutation. The purpose is twofold.

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-07-03 11:17:08
17Hashing / Search algorithms / NIST hash function competition / Keccak / Hash function / Crypt / VEST / GOST / Tabulation hashing / Cryptography / Cryptographic hash functions / Error detection and correction

Note on K parameters and usage The K sponge function family is characterized by three parameters: the bitrate r, the capacity c (where r + c is the width of the underlying permutation) and

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:42
18Block cipher / ICE / Stream cipher / Advantage / Cryptography / Keccak / NIST hash function competition

Duplexing the sponge: single-pass authenticated encryption and other applications Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
19Random oracle / Advantage / Padding / Stream cipher / Collision resistance / Hash function / Keccak / One-way compression function / Cryptography / Cryptographic hash functions / Block cipher

Cryptographic sponge functions Guido B

Add to Reading List

Source URL: sponge.noekeon.org

Language: English - Date: 2013-02-27 15:27:45
UPDATE