all InfoSec news
On the security of keyed hashing based on an unkeyed block function
Sept. 9, 2022, 3:42 p.m. |
IACR News www.iacr.org
ePrint Report: On the security of keyed hashing based on an unkeyed block function
Jonathan Fuchs, Yann Rotella, Joan Daemen
In this paper we study the security of two constructions for variable-length universal hash functions by means of their universality. Both constructions make use of a fixed-length unkeyed function that we call a block function. One construction is serial and is an idealization of the compression phase of Pelican-MAC. The other construction is parallel and is an idealization of the …
More from www.iacr.org / IACR News
Updatable Policy-Compliant Signatures
1 day, 18 hours ago |
www.iacr.org
Guess and Determine Analysis Based on Set Split
1 day, 18 hours ago |
www.iacr.org
Improving Generic Attacks Using Exceptional Functions
1 day, 18 hours ago |
www.iacr.org
Real-Valued Somewhat-Pseudorandom Unitaries
2 days, 22 hours ago |
www.iacr.org
A Variation on Knellwolf and Meier's Attack on the Knapsack Generator
2 days, 22 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Information Technology Specialist II: Network Architect
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Information Security Officer DIGI
@ Citymesh | Oostkamp, Vlaams Gewest, Belgium
Banking Sector | SOC Analyst
@ Devoteam | Porto, Portugal
Principal Cloud Security Engineer
@ Arctic Wolf | Remote - Minnesota