Differential Biases in Reduced-Round Keccak (English)
- New search for: Das, S.
- New search for: Meier, W.
- New search for: Das, S.
- New search for: Meier, W.
- New search for: Pointcheval, David
- New search for: Vergnaud, Damien
In:
Cryptology in Africa; Progress in cryptology - AFRICACRYPT 2014: 7th International Conference
8469
;
69-87
;
2014
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Differential Biases in Reduced-Round Keccak
-
Contributors:
-
Conference:International conference; 7th, Cryptology in Africa; Progress in cryptology - AFRICACRYPT 2014: 7th International Conference ; 2014 ; Marrakesh, Morocco
-
Published in:Cryptology in Africa; Progress in cryptology - AFRICACRYPT 2014: 7th International Conference , 8469 ; 69-87LECTURE NOTES IN COMPUTER SCIENCE , 8469 ; 69-87
-
Publisher:
- New search for: Springer
-
Place of publication:Cham
-
Publication date:2014-01-01
-
Size:19 pages
-
Remarks:"e-ISSN 1611-3349" --Title page verso. Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
New Results for Rank-Based CryptographyGaborit, P. / Ruatta, O. / Schrek, J. / Zemor, G. et al. | 2014
- 13
-
Proxy Re-Encryption Scheme Supporting a Selection of DelegateesDevigne, J. / Guerrini, E. / Laguillaumie, F. et al. | 2014
- 31
-
Trapdoor Privacy in Asymmetric Searchable Encryption SchemesArriaga, A. / Tang, Q. / Ryan, P. et al. | 2014
- 51
-
Kurosawa-Desmedt Key Encapsulation Mechanism, RevisitedKurosawa, K. / Phong, L.T. et al. | 2014
- 69
-
Differential Biases in Reduced-Round KeccakDas, S. / Meier, W. et al. | 2014
- 88
-
Practical Distinguishers against 6-Round Keccak-f Exploiting Self-SymmetryKuila, S. / Saha, D. / Pal, M. / Chowdhury, D.R. et al. | 2014
- 109
-
Preimage Attacks on Reduced-Round StribogAlTawy, R. / Youssef, A.M. et al. | 2014
- 126
-
Breaking the IOC Authenticated Encryption ModeBottinelli, P. / Reyhanitabar, R. / Vaudenay, S. et al. | 2014
- 136
-
New Treatment of the BSW Sampling and Its Applications to Stream CiphersDing, L. / Jin, C. / Guan, J. / Qi, C. et al. | 2014
- 147
-
Multidimensional Zero-Correlation Linear Cryptanalysis of E2Wen, L. / Wang, M. / Bogdanov, A. et al. | 2014
- 165
-
Further Improvement of Factoring RSA Moduli with Implicit HintPeng, L. / Hu, L. / Xu, J. / Huang, Z. / Xie, Y. et al. | 2014
- 178
-
New Attacks on the RSA CryptosystemNitaj, A. / Ariffin, M.R.K. / Nassr, D.I. / Bahig, H.M. et al. | 2014
- 199
-
Formulae for Computation of Tate Pairing on Hyperelliptic Curve Using Hyperelliptic NetsTran, C. et al. | 2014
- 215
-
New Speed Records for Montgomery Modular Multiplication on 8-bit AVR MicrocontrollersLiu, Z. / Grossschadl, J. et al. | 2014
- 235
-
Minimizing S-Boxes in Hardware by Utilizing Linear TransformationsKutzner, S. / Nguyen, P.H. / Poschmann, A. / Stottinger, M. et al. | 2014
- 251
-
Efficient Masked S-Boxes Processing - A Step Forward -Grosso, V. / Prouff, E. / Standaert, F.-X. et al. | 2014
- 267
-
A More Efficient AES Threshold ImplementationBilgin, B. / Gierlichs, B. / Nikova, S. / Nikov, V. / Rijmen, V. et al. | 2014
- 285
-
Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix SumOhara, K. / Ohta, K. / Suzuki, K. / Yoneyama, K. et al. | 2014
- 300
-
Position-Based Cryptography from Noisy ChannelsDziembowski, S. / Zdanowicz, M. et al. | 2014
- 318
-
A Comparison of the Homomorphic Encryption Schemes FV and YASHELepoint, T. / Naehrig, M. et al. | 2014
- 336
-
Towards Lattice Based Aggregate SignaturesEl Bansarkhani, R. / Buchmann, J. et al. | 2014
- 356
-
A Second Look at Fischlin's TransformationDagdelen, O. / Venturi, D. et al. | 2014
- 377
-
Anonymous IBE from Quadratic Residuosity with Improved PerformanceClear, M. / Tewari, H. / McGoldrick, C. et al. | 2014
- 398
-
Expressive Attribute Based Signcryption with Constant-Size CiphertextRao, Y.S. / Dutta, R. et al. | 2014
- 420
-
DRECON: DPA Resistant Encryption by ConstructionHajra, S. / Rebeiro, C. / Bhasin, S. / Bajaj, G. / Sharma, S. / Guilley, S. / Mukhopadhyay, D. et al. | 2014
- 440
-
Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression FunctionsAbed, F. / Forler, C. / List, E. / Lucks, S. / Wenzel, J. et al. | 2014
- 459
-
Universal Hash-Function Families: From Hashing to AuthenticationAlomair, B. et al. | 2014