Skye: An Expanding PRF based Fast KDF and its Applications
Abstract
References
Index Terms
- Skye: An Expanding PRF based Fast KDF and its Applications
Recommendations
Towards Post-Quantum Security for Signal’s X3DH Handshake
Selected Areas in CryptographyAbstractModern key exchange protocols are usually based on the Diffie–Hellman (DH) primitive. The beauty of this primitive, among other things, is its potential reusage of key shares: DH shares can be either used a single time or in multiple runs. Since ...
Ascon MAC, PRF, and Short-Input PRF: Lightweight, Fast, and Efficient Pseudorandom Functions
Topics in Cryptology – CT-RSA 2024AbstractIn 2023, NIST has selected Ascon as the new standard for lightweight cryptography. The Ascon v1.2 family provides authenticated encryption, hash functions, and extendable output functions, all using the same Ascon permutation. The main use case of ...
Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security
CRYPTO '02: Proceedings of the 22nd Annual International Cryptology Conference on Advances in CryptologyGiven any weak pseudorandom function, we present a general and efficient technique transforming such a function to a new weak pseudorandom function with an arbitrary length output. This implies, among other things, an encryption mode for block ciphers. ...
Comments
Information & Contributors
Information
Published In
- Chair:
- Jianying Zhou,
- Co-chair:
- Tony Q. S. Quek,
- Program Chairs:
- Debin Gao,
- Alvaro Cardenas
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- Austrian Science Fund (FWF)
- CyberSecurity Research Flanders
- Research Council KU Leuven C1
- FWO
- European Union
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 64Total Downloads
- Downloads (Last 12 months)64
- Downloads (Last 6 weeks)7
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in