More Glimpses of the RC4 Internal State Array (Englisch)
- Neue Suche nach: Chakraborty, Pranab
- Neue Suche nach: Maitra, Subhamoy
- Neue Suche nach: Bhargavan, Karthikeyan
- Weitere Informationen zu Bhargavan, Karthikeyan:
- https://orcid.org/https://orcid.org/0000-0002-3152-8997
- Neue Suche nach: Oswald, Elisabeth
- Weitere Informationen zu Oswald, Elisabeth:
- https://orcid.org/https://orcid.org/0000-0001-7502-3184
- Neue Suche nach: Prabhakaran, Manoj
- Neue Suche nach: Chakraborty, Pranab
- Neue Suche nach: Maitra, Subhamoy
In:
Progress in Cryptology – INDOCRYPT 2020
: 21st International Conference on Cryptology in India, Bangalore, India, December 13–16, 2020, Proceedings
;
Kapitel: 13
;
294-311
;
2020
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:More Glimpses of the RC4 Internal State Array
-
Weitere Titelangaben:Lect.Notes Computer
-
Beteiligte:Bhargavan, Karthikeyan ( Herausgeber:in ) / Oswald, Elisabeth ( Herausgeber:in ) / Prabhakaran, Manoj ( Herausgeber:in ) / Chakraborty, Pranab ( Autor:in ) / Maitra, Subhamoy ( Autor:in )
-
Kongress:International Conference on Cryptology in India ; 2020 ; Bangalore, India
-
Erschienen in:Progress in Cryptology – INDOCRYPT 2020 : 21st International Conference on Cryptology in India, Bangalore, India, December 13–16, 2020, Proceedings ; Kapitel: 13 ; 294-311Lecture Notes in Computer Science ; 12578 ; 294-311Security and Cryptology ; 294-311
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:08.12.2020
-
Format / Umfang:18 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact TracingPietrzak, Krzysztof et al. | 2020
- 2
-
Proof-of-Reputation Blockchain with Nakamoto FallbackKleinrock, Leonard / Ostrovsky, Rafail / Zikas, Vassilis et al. | 2020
- 3
-
Transciphering, Using FiLIP and TFHE for an Efficient Delegation of ComputationHoffmann, Clément / Méaux, Pierrick / Ricosset, Thomas et al. | 2020
- 4
-
Encrypted Key-Value StoresAgarwal, Archita / Kamara, Seny et al. | 2020
- 5
-
Formal Verification of Fair Exchange Based on Bitcoin Smart ContractsShi, Cheng / Yoneyama, Kazuki et al. | 2020
- 6
-
Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time VerificationAlmeida, José Bacelar / Barbosa, Manuel / Barthe, Gilles / Laporte, Vincent / Oliveira, Tiago et al. | 2020
- 7
-
Protocol Analysis with TimeAparicio-Sánchez, Damián / Escobar, Santiago / Meadows, Catherine / Meseguer, José / Sapiña, Julia et al. | 2020
- 8
-
Verifpal: Cryptographic Protocol Analysis for the Real WorldKobeissi, Nadim / Nicolas, Georgio / Tiwari, Mukesh et al. | 2020
- 9
-
On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded DevicesAzouaoui, Melissa / Durvaux, François / Poussier, Romain / Standaert, François-Xavier / Papagiannopoulos, Kostas / Verneuil, Vincent et al. | 2020
- 10
-
Efficient Hardware Implementations for Elliptic Curve Cryptography over Curve448Bisheh Niasar, Mojtaba / Azarderakhsh, Reza / Kermani, Mehran Mozaffari et al. | 2020
- 11
-
Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in CryptographyDutta, Abhraneel / Hutchinson, Aaron / Karabina, Koray et al. | 2020
- 12
-
Cryptanalysis of the Permutation Based Algorithm SpoCKraleva, Liliya / Posteuca, Raluca / Rijmen, Vincent et al. | 2020
- 13
-
More Glimpses of the RC4 Internal State ArrayChakraborty, Pranab / Maitra, Subhamoy et al. | 2020
- 14
-
Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-BoxGrassi, Lorenzo / Schofnegger, Markus et al. | 2020
- 15
-
Counting Active S-Boxes is not EnoughDunkelman, Orr / Kumar, Abhishek / Lambooij, Eran / Sanadhya, Somitra Kumar et al. | 2020
- 16
-
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block CiphersEichlseder, Maria / Leander, Gregor / Rasoolzadeh, Shahram et al. | 2020
- 17
-
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-Key SettingsCid, Carlos / Hosoyamada, Akinori / Liu, Yunwen / Sim, Siang Meng et al. | 2020
- 18
-
Evaluation of Quantum Cryptanalysis on SPECKAnand, Ravi / Maitra, Arpita / Mukhopadhyay, Sourav et al. | 2020
- 19
-
Making the BKW Algorithm Practical for LWEBudroni, Alessandro / Guo, Qian / Johansson, Thomas / Mårtensson, Erik / Wagner, Paul Stankovski et al. | 2020
- 20
-
On a Dual/Hybrid Approach to Small Secret LWEEspitau, Thomas / Joux, Antoine / Kharchenko, Natalia et al. | 2020
- 21
-
Adaptively Secure Threshold Symmetric-Key EncryptionMukherjee, Pratyay et al. | 2020
- 22
-
Vetted EncryptionHovd, Martha Norberg / Stam, Martijn et al. | 2020
- 23
-
Security of Public Key Encryption Against Resetting AttacksKrämer, Juliane / Struck, Patrick et al. | 2020
- 24
-
The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-rewinding Proofs for Schnorr Identification and SignaturesBellare, Mihir / Dai, Wei et al. | 2020
- 25
-
Skipping the q in Group SignaturesBlazy, Olivier / Kakvi, Saqib A. et al. | 2020
- 26
-
Incremental Cryptography Revisited: PRFs, Nonces and Modular DesignArte, Vivek / Bellare, Mihir / Khati, Louiza et al. | 2020
- 27
-
Gadget-Based iNTRU Lattice TrapdoorsGenise, Nicholas / Li, Baiyu et al. | 2020
- 28
-
Lattice-Based IBE with Equality Test Supporting Flexible Authorization in the Standard ModelNguyen, Giang Linh Duc / Susilo, Willy / Duong, Dung Hoang / Le, HuyQuoc / Guo, Fuchun et al. | 2020
- 29
-
Efficient Attribute-Based Proxy Re-Encryption with Constant Size CiphertextsPaul, Arinjita / Selvi, S. Sharmila Deva / Rangan, C. Pandu et al. | 2020
- 30
-
Adaptive-Secure Identity-Based Inner-Product Functional Encryption and Its Leakage-ResilienceZhang, Linru / Wang, Xiangning / Chen, Yuechen / Yiu, Siu-Ming et al. | 2020
- 31
-
CCA-Secure ABE Using Tag and Pair EncodingBlazy, Olivier / Mukherjee, Sayantan et al. | 2020
- 32
-
Simpler Constructions of Asymmetric Primitives from ObfuscationFarshim, Pooya / Fuchsbauer, Georg / Passelègue, Alain et al. | 2020
- 33
-
Adaptive Security of Practical Garbling SchemesJafargholi, Zahra / Oechsner, Sabine et al. | 2020
- 34
-
Constructive t-secure Homomorphic Secret Sharing for Low Degree PolynomialsPhalakarn, Kittiphop / Suppakitpaisarn, Vorapong / Attrapadung, Nuttapong / Matsuura, Kanta et al. | 2020
- 35
-
Perfectly-Secure Asynchronous MPC for General Adversaries (Extended Abstract)Choudhury, Ashish / Pappu, Nikhil et al. | 2020
- 36
-
Improving the Efficiency of Optimally-Resilient Statistically-Secure Asynchronous Multi-party ComputationChoudhury, Ashish et al. | 2020
- 37
-
High Throughput Secure MPC over Small Population in Hybrid Networks (Extended Abstract)Choudhury, Ashish / Hegde, Aditya et al. | 2020
- 38
-
Dual-Mode NIZKs: Possibility and Impossibility Results for Property TransferArte, Vivek / Bellare, Mihir et al. | 2020
- 39
-
On Black-Box Extension of a Non-Interactive Zero-Knowledge Proof System for Secret EqualityYamashita, Kyosuke / Tibouchi, Mehdi / Abe, Masayuki et al. | 2020
- 40
-
Correction to: Security of Public Key Encryption Against Resetting AttacksKrämer, Juliane / Struck, Patrick et al. | 2021