Skip to main content

and
Your search also matched 1 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Implicit Key-Stretching Security of Encryption Schemes

Include preview-only content
  1. Chapter and Conference Paper

    New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity

    Dithered hash functions were proposed by Rivest as a method to mitigate second preimage attacks on Merkle-Damgård hash functions. Despite that, second preimage attacks against dithered hash functions were prop...

    Muhammad Barham, Orr Dunkelman, Stefan Lucks in Selected Areas in Cryptography – SAC 2016 (2017)

  2. Chapter and Conference Paper

    Gimli : A Cross-Platform Permutation

    This paper presents Gimli, a 384-bit permutation designed to achieve high security with high performance across a broad range of platforms, including 64-bit Intel/AMD server CPUs, 64-bit and 32-bit ARM smartphone...

    Daniel J. Bernstein, Stefan Kölbl in Cryptographic Hardware and Embedded System… (2017)