Verónica Requena
Intel
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Verónica Requena.
IEEE Transactions on Information Theory | 2010
Konstantinos Drakakis; Verónica Requena; Gary McGuire
In 2002, in two independent papers, Bellare, Kohno, and Namprempre and Joux, Martinet, and Valette introduced the notion of blockwise security for modes of operations. This notion stems from common practice, since in many applications, modes of operation for block ciphers do not process messages as atomic entities but in a incremental manner, block after block. Soon afterward, several papers showed that many modes of operation are already blockwise secure and that others can be made secure by simple modifications. In this paper, we revisit these results, by comparing possible attacks on modes of operation after the birthday bound is reached. Amusingly, in spite having essentially identical security proofs up to this bound, modes of operation in the blockwise model behave very differently than their counterparts in the regular model, once the birthday paradox bound is crossed.In 2002, in two independent papers, Bellare, Kohno, and Namprempre and Joux, Martinet, and Valette introduced the notion of blockwise security for modes of operations. This notion stems from common practice, since in many applications, modes of operation for block ciphers do not process messages as atomic entities but in a incremental manner, block after block. Soon afterward, several papers showed that many modes of operation are already blockwise secure and that others can be made secure by simple modifications. In this paper, we revisit these results, by comparing possible attacks on modes of operation after the birthday bound is reached. Amusingly, in spite having essentially identical security proofs up to this bound, modes of operation in the blockwise model behave very differently than their counterparts in the regular model, once the birthday paradox bound is crossed.
Advances in Mathematics of Communications | 2008
Joan-Josep Climent; Francisco J. García; Verónica Requena
In this paper we present a method to construct iteratively new bent functions of
international symposium on information theory and its applications | 2010
Joan-Josep Climent; Francisco J. García; Verónica Requena
n + 2
Algebra | 2014
Joan-Josep Climent; Francisco J. García; Verónica Requena
variables from bent functions of
international conference on data technologies and applications | 2013
Sara D. Cardell; Joan-Josep Climent; Verónica Requena
n
international conference on data technologies and applications | 2013
Joan-Josep Climent; F. J. Garc; Verónica Requena
variables using minterms of
International Journal of Computer Mathematics | 2012
Joan-Josep Climent; Francisco J. García; Verónica Requena
n
international symposium on information theory and its applications | 2008
Joan-Josep Climent; Francisco J. García; Verónica Requena
variables and minterms of two variables. Also, we provide the number of bent functions of
Mathematics in Computer Science | 2018
Joan-Josep Climent; Francisco J. García; Verónica Requena
n+2
Cryptography and Communications | 2018
Joan-Josep Climent; Verónica Requena; Xaro Soler-Escrivà
variables that we can obtain with the method here presented.