scispace - formally typeset
Search or ask a question
Topic

Sponge function

About: Sponge function is a research topic. Over the lifetime, 159 publications have been published within this topic receiving 3919 citations.


Papers
More filters
Posted Content
TL;DR: In this paper, a stream cipher based algorithm for computing message authentication codes is described, which employs the internal state of the underlying cipher to minimize the required additional-to-encryption computational effort and maintain general simplicity of the design.
Abstract: A stream cipher based algorithm for computing Message Authentication Codes is described. The algorithm employs the internal state of the underlying cipher to minimize the required additional-toencryption computational effort and maintain general simplicity of the design. The scheme appears to provide proper statistical properties, a comfortable level of resistance against forgery attacks in a chosen ciphertext attack model and high efficiency in software implementations.

8 citations

Book ChapterDOI
18 Oct 2014-Space
TL;DR: The primitive function of CASH family is proved to be secure against the state-of-the-art attacks and outperforms the SHA-3 finalists with respect to throughput and throughput/area.
Abstract: In this paper, we propose a new Cellular Automata (CA) based scalable parameterized hash function family named CASH The construction of CASH is inspired by sponge function and the internal round transformation employs linear CA For the first time, we have managed to merge the classical add-round-constant and subsequent diffusion layers The primitive function of CASH family is proved to be secure against the state-of-the-art attacks All the designs are implemented on Xilinx Virtex-6 FPGAs and compared with the best reported results in literature The results show that CASH outperforms the SHA-3 finalists with respect to throughput and throughput/area

8 citations

Journal ArticleDOI
TL;DR: It is shown that both Tseng et al.'s authenticated encryption schemes do not achieve integrity and authentication and improvements are then proposed to repair the weaknesses.

8 citations

Book ChapterDOI
02 Apr 2009
TL;DR: Twister incorporates the ideas of wide pipe and sponge functions providing both extremely fast diffusion as well as collision-freeness for one Mini-Round and is claimed to be secure against all known generic attacks.
Abstract: In this paper we present Twister , a new framework for hash functions. Twister incorporates the ideas of wide pipe and sponge functions. The core of this framework is a --- very easy to analyze --- Mini-Round providing both extremely fast diffusion as well as collision-freeness for one Mini-Round . The total security level is claimed to be not below 2 n /2 for collision attacks and 2 n for 2nd pre-image attacks. Twister instantiations are secure against all known generic attacks. We also propose three instances Twister -n for hash output sizes n = 224,256,384,512. These instantiations are highly optimized for 64-bit architectures and run very fast in hardware and software, e.g Twister -256 is faster than SHA2-256 on 64-bit platforms and Twister -512 is faster than SHA2-512 on 32-bit platforms. Furthermore, Twister scales very well on low-end platforms.

8 citations

Proceedings ArticleDOI
18 Nov 2008
TL;DR: The experimental results indicate that CPA of synchronous stream ciphers is feasible and a novel CPA against synchronousStreamCiphers.com is proposed.
Abstract: Power analysis attacks as side channel analysis techniques of cryptographic devices have been mounted against block ciphers and public key but rarely against stream ciphers. There are no reports on correlation power analysis (CPA) attack against stream ciphers so far. This paper proposes a novel CPA against synchronous stream ciphers. Then we present two experiments of CPA attacks on stream ciphers A5/1 and E0. The experimental results indicate that CPA of synchronous stream ciphers is feasible.

8 citations

Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
78% related
Encryption
98.3K papers, 1.4M citations
77% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Authentication
74.7K papers, 867.1K citations
73% related
Access control
32.6K papers, 475K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20211
20203
20195
20186
201714
201616