Articles with "key security" as a keyword



Photo by hudsoncrafted from unsplash

Generalized Tweakable Even-Mansour Cipher and Its Applications

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Computer Science and Technology"

DOI: 10.1007/s11390-018-1886-4

Abstract: This paper describes a generalized tweakable blockcipher HPH (Hash-Permutation-Hash), which is based on a public random permutation P and a family of almost-XOR-universal hash functions H=HKK∈K$$ \mathcal{H}={\left\{ HK\right\}}_{K\in \mathcal{K}} $$ as a tweak and key… read more here.

Keywords: multi key; hph; generalized tweakable; security ... See more keywords

Finite-key security analysis for quantum key distribution with leaky sources

Sign Up to like & get
recommendations!
Published in 2018 at "New Journal of Physics"

DOI: 10.1088/1367-2630/aad839

Abstract: Security proofs of quantum key distribution (QKD) typically assume that the devices of the legitimate users are perfectly shielded from the eavesdropper. This assumption is, however, very hard to meet in practice, and thus the… read more here.

Keywords: qkd; key distribution; security; finite key ... See more keywords