Questions tagged [literature]

Literature describes everything that has been written and/or visualized (here: in relation cryptography), which ranges from papers to books, and from publications to presentations.

Literature describes everything that has been written and/or visualized (here: in relation cryptography), which ranges from papers to books, and from publications to presentations.

15 questions
17
votes
2 answers

How did || come to be used in crypto texts to represent concatenation?

In RFC5647, NIST SP 800-38D, etc., || is used to denote concatenation. How did that come to be? In most programming languages || represents "or" and + denotes concatenation and the fact that crypto texts just kind of mixed it up seems to make for an…
neubert
  • 2,969
  • 1
  • 29
  • 58
16
votes
2 answers

How to do a literature search

How do I do a literature search of the research literature on cryptography? Assume there's some topic in cryptography I'd like to learn more about; how do I search the cryptographic research literature to find research papers that might be…
D.W.
  • 36,982
  • 13
  • 107
  • 196
11
votes
1 answer

Most influential/illuminating papers/books/courses on lattice based cryptography?

I'm interested in some sort of "compendium" on lattice-based crypto. There are a bunch of maths behind FALCON and other stuff. A lot of articles are devoted to lattice crypto, but not of them are of paramount importance. The other problem is that…
Kirill Tsar.
  • 609
  • 4
  • 13
11
votes
1 answer

Non-iterative cryptographic hash functions

Consider the following cryptographic hash function $H$ which maps a message $m$ of variable size to $b$ bits: $$H:\{0,1\}^{*} \mapsto \{0,1\}^b$$ $$y = H(m) = SPRP(IV||m||padding)\mid_{b}$$ , where: $$SPRP:\{0,1\}^n \mapsto…
10
votes
1 answer

Are there any authoritative definitions of "key stretching"?

This is mostly a terminology question, but I suppose that it is best asked and answered here. After browsing the Internet I have come across a fair number of completely different definitions of the term "key stretching" and would like to know if…
5
votes
1 answer

Cryptanalysis in the middle ages -- publications

Are there any publications, articles or literature discussing cryptanalysis and crypt breaking techniques in the middle-ages? I have seen various manuals from the middle ages describing various types of encryption, also mentioning that Caesar…
L D
  • 151
  • 1
  • 4
5
votes
1 answer

What kind of information in cryptography is called semantic information?

I have been studying cognitive cryptography from this article. Its definition of cognitive cryptography is: Cognitive cryptography is a division of cryptography within which any information set can be secured using personal information…
user0410
  • 253
  • 3
  • 13
5
votes
1 answer

Academic papers on ECDSA security

What are the most authoritative papers on the security analysis of ECDSAs? I`m mainly looking for comparisons of how secure different curves are considered to be, what potential methods are there of discovering a private key based on the public key,…
ThePiachu
  • 1,689
  • 2
  • 18
  • 26
4
votes
1 answer

Difference between Katz and Lindell's book and Bellare and Rogaway's notes

I just had an undergraduate introductory course on cryptography and computer systems security. The course has an additional reading material: Katz and Lindell's Introduction to Modern Cryptography. Now after all the lectures and coursework of the…
Guanyuming He
  • 213
  • 1
  • 7
2
votes
0 answers

Simplicity and precision in cryptography papers

I know a PhD student who recently had his paper on applied cryptography rejected because one the reviewers claimed that it was "the solution was too simple and the notation used was more than necessary". It was accepted by the second reviewer.…
petro444
  • 125
  • 6
2
votes
2 answers

What does $\Pi$ represent in cryptography?

I am doing a project in cryptography and while reading a tag generation algorithm for files, I got stuck with the meaning of $\Pi$. The screenshot of the algorithm is inserted below. Here the KeyGen algorithm generates 1 public key and 2 secret…
Anjo
  • 139
  • 4
0
votes
0 answers

DLP instances for given number of congruences

Let $S$ be the set of $k$ congruences of the type $g_{i}^{x_i} \equiv h_i \pmod{n_i}, \quad \forall i,1\leq i \leq k$ What would be the best way to describe such set $S$ with a term in literature. The goal is that the reader immediately thinks about…
0
votes
0 answers

Correlated or biased coin protocols?

There are a number of papers in the literature describing secure/fair coin flipping protocols. Unfortunately in my case, I am looking for coins that are epsilon-biased or epsilon-correlated. I am looking for a coin-flipping protocol that is…
Craig
  • 1
0
votes
0 answers

A cryptographic proof system which uses rewinding to argue soundness but is not a proof of knowledge?

Are there any cryptographic proof systems that rewind the prover to argue soundness but are not proofs of knowledge? In particular, I would be very curious to see examples of proof systems where rewinding is useful for arguing soundness but does not…
-1
votes
1 answer

Possible anomaly in Cryptonomicon

Toward the beginning of Neal Stephenson's Cryptonomicon, Avi gives Randy two strings of sixteen supposedly random hexadecimal numbers as encryption keys: AF 10 06 E9 99 BA 11 07 64 C1 89 E3 40 8C 72 55 67 81 A4 AE FF 40 25 9B …
Nippers
  • 11
  • 1