Ausgabe 2/2015
Inhalt (6 Artikel)
Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions
Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala, Pouyan Sepehrdad
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool
Mario Lamberger, Florian Mendel, Martin Schläffer, Christian Rechberger, Vincent Rijmen
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
Yehuda Lindell, Benny Pinkas
Computing on Authenticated Data
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters