Topic
Sponge function
About: Sponge function is a research topic. Over the lifetime, 159 publications have been published within this topic receiving 3919 citations.
Papers published on a yearly basis
Papers
More filters
•
26 Jun 2012
TL;DR: A method of generating filtered sequences with guaranteed cryptographic parameters has been developed and the proposed nonlinear filters are simple, easy to be implemented and can be applied in a range of cryptographic interest.
Abstract: Nowadays stream ciphers are the fastest among the encryption procedures so they are implemented in many technological applications. Nonlinear filters are very simple generators of pseudorandom sequences to be used as keystream sequences in stream cipher applications. In this paper, a method of generating filtered sequences with guaranteed cryptographic parameters has been developed. The proposed nonlinear filters are simple, easy to be implemented and can be applied in a range of cryptographic interest.
••
02 Dec 2020TL;DR: In this article, the authors modify ASCON 128a exploiting the pseudo-random properties of cellular automata (CA) to prevent statistical Ineffective Fault attack (SIFA) and Sub-Set Fault Analysis (SSFA).
Abstract: ASCON is a sponge function based authenticated encryption (AE) scheme chosen in CAESAR competition for lightweight applications. Its suitability for high performance applications make it desirable in environments like Internet of Things (IoT) where large number of very constrained devices communicate with high-end servers. The drawback is that fault analyses like Statistical Ineffective fault attack (SIFA) and Sub-Set Fault Analysis (SSFA) are possible. In this paper, we modify ASCON 128a exploiting the pseudo-random properties of Cellular Automata (CA) to prevent these attacks.
01 Jan 1986
TL;DR: This paper discusses the use of an arbitrary bit-sequence generating algorithm as the cryptographic key for a stream cipher with emphasis on methods for combining stream generators into more complex ones, with and without randomization.
Abstract: This paper discusses the use of an arbitrary bit-sequence generating algorithm as the cryptographic key for a stream cipher. Emphasis is placed on methods for combining stream generators into more complex ones, with and without randomization. Threshold schemes give a generalization of many combination techniques.
••
05 May 2017TL;DR: This paper is the first proposal of matching biometric data using cryptographic one-way hashes and experimental results with the NIST fingerprint database sd14v2 show the feasibility of the proposed approach.
Abstract: In password based authentication system, passwords are only stored and matched using cryptographic one-way hashes. Various biometrics have been utilized as an alternative authentication mechanism due to their permanent physical connections to a person. However, people have yet to see their usages in the formats of cryptographic one-way hashes for the reason that biometric templates cannot be reproduced with perfect accuracy and a tiny change in a template would significantly change its cryptographic hash value. In this paper we propose a novel approach of storing and matching fingerprint data with cryptographic one-way hashes. To our knowledge, it is the first proposal of matching biometric data using cryptographic one-way hashes. Experimental results with the NIST fingerprint database sd14v2 show the feasibility of our proposal.