Ausgabe 2/2024
Inhalt (11 Artikel)
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
Marc Fischlin, Felix Günther, Christian Janson
Time-Space Lower Bounds for Finding Collisions in Merkle–Damgård Hash Functions
Akshima, Siyao Guo, Qipeng Liu
Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root Algorithm
Dmitrii Koshelev
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
Dennis Hofheinz, Jessica Koch, Christoph Striecks
Entropy Computation for Oscillator-based Physical Random Number Generators
David Lubicz, Viktor Fischer
Collision Resistance from Multi-collision Resistance
Ron D. Rothblum, Prashant Nalini Vasudevan
The COLM Authenticated Encryption Scheme
Elena Andreeva, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi, Elmar Tischhauser, Kan Yasuda
Bandwidth-Hard Functions: Reductions and Lower Bounds
Jeremiah Blocki, Peiyuan Liu, Ling Ren, Samson Zhou
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light Updates
Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
Bitcoin as a Transaction Ledger: A Composable Treatment
Christian Badertscher, Ueli Maurer, Daniel Tschudi, Vassilis Zikas
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery
Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, Jian Weng