Results 1 to 10 of about 981,100 (173)

Avalanche Effect in Improperly Initialized CAESAR Candidates [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2016
Cryptoprimitives rely on thorough theoretical background, but often lack basic usability features making them prone to unintentional misuse by developers. We argue that this is true even for the state-of-the-art designs.
Martin Ukrop, Petr Švenda
doaj   +3 more sources

Competition-driven eco-evolutionary feedback reshapes bacteriophage lambda's fitness landscape and enables speciation. [PDF]

open access: yesNat Commun
Niche theory is often invoked to explain biodiversity, but it does not explain how species evolve to exploit unique niches. Using a combination of experimental and computational approaches, this study shows that resource competition can deform fitness ...
Doud MB   +5 more
europepmc   +2 more sources

Post-Quantum Security of COPA [PDF]

open access: yesEntropy
COPA is a notable authenticated online cipher and was one of the winning proposals for the CAESAR competition. Current works describe how to break the existentially unforgeable under quantum chosen message attack (EUF-qCMA) of COPA.
Ping Zhang, Yutao Wang
doaj   +2 more sources

Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
This paper introduces and analyzes Triplex, a leakage-resistant mode of operation based on Tweakable Block Ciphers (TBCs) with 2n-bit tweaks. Triplex enjoys beyond-birthday ciphertext integrity in the presence of encryption and decryption leakage in a ...
Yaobin Shen   +4 more
doaj   +3 more sources

Authenticated Encryption Schemes: A Systematic Review

open access: yesIEEE Access, 2022
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its formal inception in 2000.
Mohamud Ahmed Jimale   +6 more
doaj   +1 more source

Weak Keys in Reduced AEGIS and Tiaoxin

open access: yesIACR Transactions on Symmetric Cryptology, 2021
AEGIS-128 and Tiaoxin-346 (Tiaoxin for short) are two AES-based primitives submitted to the CAESAR competition. Among them, AEGIS-128 has been selected in the final portfolio for high-performance applications, while Tiaoxin is a third-round candidate ...
Fukang Liu   +3 more
doaj   +1 more source

New forgery attack on the authenticated cipher SCREAM and iSCREAM

open access: yes网络与信息安全学报, 2016
Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission.
Yu-dan TIAN, Yong-zhuang WEI
doaj   +3 more sources

Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces

open access: yesIEEE Access, 2022
Since its birth in 2000, authenticated encryption (AE) has been a hot research topic, and many new features have been proposed to boost its security or performance.
Mohamud Ahmed Jimale   +6 more
doaj   +1 more source

Cryptanalysis of NORX v2.0

open access: yesIACR Transactions on Symmetric Cryptology, 2017
NORX is an authenticated encryption scheme with associated data being publicly scrutinized as part of the ongoing CAESAR competition, where 14 other primitives are also competing.
Colin Chaigneau   +4 more
doaj   +1 more source

New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect

open access: yesIACR Transactions on Symmetric Cryptology, 2019
In the CAESAR competition, Deoxys-I and Deoxys-II are two important authenticated encryption schemes submitted by Jean et al. Recently, Deoxys-II together with Ascon, ACORN, AEGIS-128, OCB and COLM have been selected as the final CAESAR portfolio ...
Boxin Zhao, Xiaoyang Dong, Keting Jia
doaj   +1 more source

Home - About - Disclaimer - Privacy