Results 1 to 10 of about 981,100 (173)
Avalanche Effect in Improperly Initialized CAESAR Candidates [PDF]
Cryptoprimitives rely on thorough theoretical background, but often lack basic usability features making them prone to unintentional misuse by developers. We argue that this is true even for the state-of-the-art designs.
Martin Ukrop, Petr Švenda
doaj +3 more sources
Competition-driven eco-evolutionary feedback reshapes bacteriophage lambda's fitness landscape and enables speciation. [PDF]
Niche theory is often invoked to explain biodiversity, but it does not explain how species evolve to exploit unique niches. Using a combination of experimental and computational approaches, this study shows that resource competition can deform fitness ...
Doud MB +5 more
europepmc +2 more sources
Post-Quantum Security of COPA [PDF]
COPA is a notable authenticated online cipher and was one of the winning proposals for the CAESAR competition. Current works describe how to break the existentially unforgeable under quantum chosen message attack (EUF-qCMA) of COPA.
Ping Zhang, Yutao Wang
doaj +2 more sources
Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation
This paper introduces and analyzes Triplex, a leakage-resistant mode of operation based on Tweakable Block Ciphers (TBCs) with 2n-bit tweaks. Triplex enjoys beyond-birthday ciphertext integrity in the presence of encryption and decryption leakage in a ...
Yaobin Shen +4 more
doaj +3 more sources
Authenticated Encryption Schemes: A Systematic Review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000.
Mohamud Ahmed Jimale +6 more
doaj +1 more source
Weak Keys in Reduced AEGIS and Tiaoxin
AEGIS-128 and Tiaoxin-346 (Tiaoxin for short) are two AES-based primitives submitted to the CAESAR competition. Among them, AEGIS-128 has been selected in the final portfolio for high-performance applications, while Tiaoxin is a third-round candidate ...
Fukang Liu +3 more
doaj +1 more source
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission.
Yu-dan TIAN, Yong-zhuang WEI
doaj +3 more sources
Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance.
Mohamud Ahmed Jimale +6 more
doaj +1 more source
NORX is an authenticated encryption scheme with associated data being publicly scrutinized as part of the ongoing CAESAR competition, where 14 other primitives are also competing.
Colin Chaigneau +4 more
doaj +1 more source
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect
In the CAESAR competition, Deoxys-I and Deoxys-II are two important authenticated encryption schemes submitted by Jean et al. Recently, Deoxys-II together with Ascon, ACORN, AEGIS-128, OCB and COLM have been selected as the final CAESAR portfolio ...
Boxin Zhao, Xiaoyang Dong, Keting Jia
doaj +1 more source

