Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Computer Science and Technology"
DOI: 10.1007/s11390-018-1886-4
Abstract: This paper describes a generalized tweakable blockcipher HPH (Hash-Permutation-Hash), which is based on a public random permutation P and a family of almost-XOR-universal hash functions H=HKK∈K$$ \mathcal{H}={\left\{ HK\right\}}_{K\in \mathcal{K}} $$ as a tweak and key…
read more here.
Keywords:
multi key;
hph;
generalized tweakable;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "New Journal of Physics"
DOI: 10.1088/1367-2630/aad839
Abstract: Security proofs of quantum key distribution (QKD) typically assume that the devices of the legitimate users are perfectly shielded from the eavesdropper. This assumption is, however, very hard to meet in practice, and thus the…
read more here.
Keywords:
qkd;
key distribution;
security;
finite key ... See more keywords