Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Implicit Key-Stretching Security of Encryption Schemes

    When keys are small or parts thereof leak, key-recovery attacks on symmetric-key primitives still pose a plausible threat. Key stretching is one well-known means to throttle potential adversaries, where stretc...

    Jannis Bossert, Eik List, Stefan Lucks in Information Security and Cryptology – ICISC 2022 (2023)

  2. Chapter and Conference Paper

    New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity

    Dithered hash functions were proposed by Rivest as a method to mitigate second preimage attacks on Merkle-Damgård hash functions. Despite that, second preimage attacks against dithered hash functions were prop...

    Muhammad Barham, Orr Dunkelman, Stefan Lucks in Selected Areas in Cryptography – SAC 2016 (2017)

  3. Chapter and Conference Paper

    Gimli : A Cross-Platform Permutation

    This paper presents Gimli, a 384-bit permutation designed to achieve high security with high performance across a broad range of platforms, including 64-bit Intel/AMD server CPUs, 64-bit and 32-bit ARM smartphone...

    Daniel J. Bernstein, Stefan Kölbl in Cryptographic Hardware and Embedded System… (2017)