Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Implicit Key-Stretching Security of Encryption Schemes

    When keys are small or parts thereof leak, key-recovery attacks on symmetric-key primitives still pose a plausible threat. Key stretching is one well-known means to throttle potential adversaries, where stretc...

    Jannis Bossert, Eik List, Stefan Lucks in Information Security and Cryptology – ICISC 2022 (2023)

  2. Chapter and Conference Paper

    New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity

    Dithered hash functions were proposed by Rivest as a method to mitigate second preimage attacks on Merkle-Damgård hash functions. Despite that, second preimage attacks against dithered hash functions were prop...

    Muhammad Barham, Orr Dunkelman, Stefan Lucks in Selected Areas in Cryptography – SAC 2016 (2017)

  3. Chapter and Conference Paper

    Gimli : A Cross-Platform Permutation

    This paper presents Gimli, a 384-bit permutation designed to achieve high security with high performance across a broad range of platforms, including 64-bit Intel/AMD server CPUs, 64-bit and 32-bit ARM smartphone...

    Daniel J. Bernstein, Stefan Kölbl in Cryptographic Hardware and Embedded System… (2017)

  4. Chapter and Conference Paper

    Secure Data Management in Trusted Computing

    In this paper we identify shortcomings of the TCG specification related to the availability of sealed data during software and hardware life cycles, i.e., software update or/and hardware migration. In our view...

    Ulrich Kühn, Klaus Kursawe, Stefan Lucks in Cryptographic Hardware and Embedded System… (2005)

  5. No Access

    Chapter and Conference Paper

    Security on Your Hand: Secure Filesystems with a “Non-cryptographic” JAVA-Ring

    In this paper we present the first implementation of highspeed filesystem encryption with a slow JAVA card. Using new “Remotely Keyed Protocols” designed by Lucks and Weis we can use the highly tamper-resistan...

    Rüdiger Weis, Bastiaan Bakker, Stefan Lucks in Java on Smart Cards:Programming and Security (2001)