![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Designing the API for a Cryptographic Library
Most of the time, cryptography fails due to “implementation and management errors”. So the task at hand is to design a cryptographic library to ease its safe use and to hinder implementation errors. This is of...
-
Chapter and Conference Paper
On the Security of Tandem-DM
We provide the first proof of security for Tandem-DM, one of the oldest and most well-known constructions for turning a block cipher with n-bit block length and 2n-bit key length into a 2n-bit cryptographic hash ...
-
Chapter and Conference Paper
Improved Generic Algorithms for 3-Collisions
An r-collision for a function is a set of r distinct inputs with identical outputs. Actually finding r-collisions for a random map over a finite set of cardinality N requires at least about N (r −...
-
Chapter and Conference Paper
Security on Your Hand: Secure Filesystems with a “Non-cryptographic” JAVA-Ring
In this paper we present the first implementation of highspeed filesystem encryption with a slow JAVA card. Using new “Remotely Keyed Protocols” designed by Lucks and Weis we can use the highly tamper-resistan...
-
Chapter and Conference Paper
On the Security of the 128-bit Block Cipher DEAL
DEAL is a DES-based block cipher proposed by Knudsen. The block size of DEAL is 128 bits, twice as much as the DES block size. The main result of the current paper is a certificational attack on DEAL- 192, the...
-
Chapter and Conference Paper
Accelerated Remotely Keyed Encryption
Remotely keyed encryption schemes (RKESs) support fast encryption and decryption using low-bandwidth devices, such as secure smartcards. The long-lived secret keys never leave the smartcard, but most of the en...