scispace - formally typeset
Search or ask a question
Topic

Sponge function

About: Sponge function is a research topic. Over the lifetime, 159 publications have been published within this topic receiving 3919 citations.


Papers
More filters
Proceedings Article
26 Jun 2012
TL;DR: A method of generating filtered sequences with guaranteed cryptographic parameters has been developed and the proposed nonlinear filters are simple, easy to be implemented and can be applied in a range of cryptographic interest.
Abstract: Nowadays stream ciphers are the fastest among the encryption procedures so they are implemented in many technological applications. Nonlinear filters are very simple generators of pseudorandom sequences to be used as keystream sequences in stream cipher applications. In this paper, a method of generating filtered sequences with guaranteed cryptographic parameters has been developed. The proposed nonlinear filters are simple, easy to be implemented and can be applied in a range of cryptographic interest.
Book ChapterDOI
02 Dec 2020
TL;DR: In this article, the authors modify ASCON 128a exploiting the pseudo-random properties of cellular automata (CA) to prevent statistical Ineffective Fault attack (SIFA) and Sub-Set Fault Analysis (SSFA).
Abstract: ASCON is a sponge function based authenticated encryption (AE) scheme chosen in CAESAR competition for lightweight applications. Its suitability for high performance applications make it desirable in environments like Internet of Things (IoT) where large number of very constrained devices communicate with high-end servers. The drawback is that fault analyses like Statistical Ineffective fault attack (SIFA) and Sub-Set Fault Analysis (SSFA) are possible. In this paper, we modify ASCON 128a exploiting the pseudo-random properties of Cellular Automata (CA) to prevent these attacks.
01 Jan 1986
TL;DR: This paper discusses the use of an arbitrary bit-sequence generating algorithm as the cryptographic key for a stream cipher with emphasis on methods for combining stream generators into more complex ones, with and without randomization.
Abstract: This paper discusses the use of an arbitrary bit-sequence generating algorithm as the cryptographic key for a stream cipher. Emphasis is placed on methods for combining stream generators into more complex ones, with and without randomization. Threshold schemes give a generalization of many combination techniques.
Proceedings ArticleDOI
05 May 2017
TL;DR: This paper is the first proposal of matching biometric data using cryptographic one-way hashes and experimental results with the NIST fingerprint database sd14v2 show the feasibility of the proposed approach.
Abstract: In password based authentication system, passwords are only stored and matched using cryptographic one-way hashes. Various biometrics have been utilized as an alternative authentication mechanism due to their permanent physical connections to a person. However, people have yet to see their usages in the formats of cryptographic one-way hashes for the reason that biometric templates cannot be reproduced with perfect accuracy and a tiny change in a template would significantly change its cryptographic hash value. In this paper we propose a novel approach of storing and matching fingerprint data with cryptographic one-way hashes. To our knowledge, it is the first proposal of matching biometric data using cryptographic one-way hashes. Experimental results with the NIST fingerprint database sd14v2 show the feasibility of our proposal.
Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
78% related
Encryption
98.3K papers, 1.4M citations
77% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Authentication
74.7K papers, 867.1K citations
73% related
Access control
32.6K papers, 475K citations
73% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20211
20203
20195
20186
201714
201616