An Ultrafast Cryptographically Secure Pseudorandom Number Generator (English)
- New search for: Zheng, Jianliang
- New search for: Li, Jie
- New search for: Zheng, Jianliang
- New search for: Li, Jie
In:
Information security and cryptology – ICISC 2022
; 267-291
;
2023
-
ISBN:
- Conference paper / Print
-
Title:An Ultrafast Cryptographically Secure Pseudorandom Number Generator
-
Contributors:Zheng, Jianliang ( author ) / Li, Jie ( author )
-
Conference:International Conference on Information Security and Cryptology ; 25. ; 2022 ; Seoul
-
Published in:
-
Publisher:
- New search for: Springer
-
Place of publication:Cham
-
Publication date:2023
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
- New search for: 54.38 / 54.72
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULTPark, Jonghyun / Kim, Jongsung et al. | 2023
- 17
-
Implicit Key-Stretching Security of Encryption SchemesBossert, Jannis / List, Eik / Lucks, Stefan et al. | 2023
- 41
-
Related-Key Differential Cryptanalysis of GMiIMC Used in Post-Quantum SignaturesChen, Shiyao / Guo, Chun / Guo, Jian / Liu, Li / Wang, Meigin / Wei, Puwen / Xu, Zeyu et al. | 2023
- 61
-
Impossible Differential Cryptanalysis on Reduced-Round PRINCEcoreZhang, Li / Wu, Wenling / Mao, Yongxia et al. | 2023
- 81
-
Towards Constructing Consistent Pattern Strength Meters with User’s Visual PerceptionPark, Leo Hyun / chmg, Eunbi / Lee, Donggun / Kwon, Taekyoung et al. | 2023
- 100
-
Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption SystemsAlatawi, Mashari / Saxena, Nitesh et al. | 2023
- 124
-
Differential Testing of Cryptographic Libraries with Hybrid FuzzingJin, Hoyong / An, Dohyeon / Kwon, Taekyoung et al. | 2023
- 147
-
Public Key Encryption with Hierarchical Authorized Keyword SearchLiu, Zi-Yuan / Chien, Chu-Chieh / Tseng, Yi-Fan / Tso, Raylin / Mambo, Masahiro et al. | 2023
- 171
-
Private Evaluation of a Decision Tree Based on Secret SharingAhmed, Mohammad Nabil / Shimizu, Kana et al. | 2023
- 195
-
Reputation at Stake! A Trust Layer over Decentralized Ledger for Multiparty Computation and Reputation-Fair LotteryLarangeira, Mario et al. | 2023
- 219
-
Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based CryptoSystemsSeck, Boly / Cayrel, Pierre-Louis / Diop, Idy / Dragoi, Vlad-Florin / Couzon, Kalen / Colombier, Brice / Grosso, Vincent et al. | 2023
- 235
-
Differential Fault Attack on AES Using Maximum Four Bytes Faulty CIphertextsHuh, Jae-Won / Han, Dong-Guk et al. | 2023
- 249
-
A Performance Evaluation of IPsec with Post-Quantum CryptographyBae, Seungyeon / Chang, Yousung / Park, Hyeongjin / Kim, Minseo / Shin, Youngjoo et al. | 2023
- 267
-
An Ultrafast Cryptographically Secure Pseudorandom Number GeneratorZheng, Jianliang / Li, Jie et al. | 2023
- 292
-
Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4Anastasova, Mila / Azarderakhsh, Reza / Kermani, Mehran Mozaffari / Beshaj, Lubjana et al. | 2023
- 317
-
Pointcheval-Sanders Signature-Based Synchronized Aggregate SignatureTezuka, Masayuki / Tanaka, Keisuke et al. | 2023
- 337
-
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-HidingIshizaka, Masahito / Fukushima, Kazuhide / Kiyomoto, Shinsaku et al. | 2023
- 363
-
Group Testing Aggregate Signatures with SoundnessSato, Shingo / Shikata, Junji / Matsumoto, Tsutomu et al. | 2023
- 382
-
Attribute-Based Signatures for Range of Inner Product and Its ApplicationsIshizaka, Masahito / Fukushima, Kazuhide et al. | 2023
- 408
-
Identity-based Interactive Aggregate Signatures from LatticesSato, Shingo / Shikata, Junji et al. | 2023
- 435
-
Analysis of (U,U+V)-code Problem with Gramian over Binary and Ternary FieldsIwata, Ichiro / Yoshida, Yusuke / Tanaka, Keisuke et al. | 2023
- 450
-
A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM EmanationsWang, Ruize / Ngo, Kalle / Dubrova, Elena et al. | 2023
- 472
-
Preimage Sampling in the Higher-bit Approximate Setting with a Non-spherical Gaussian SamplerDévéhat, Anaëlle Le / Hasegawa, Shingo / Shizuya, Hiroki et al. | 2023
- 491
-
WOTSwana: A Generalized Seeve Construction for Multiple Proofs of OwnershipChaum, David / Larangeira, Mario / Yaksetig, Mario et al. | 2023