Results 11 to 20 of about 153 (84)
Boomerang Connectivity Table:A New Cryptanalysis Tool [PDF]
A boomerang attack is a cryptanalysis framework that regards a block cipher $E$ as the composition of two sub-ciphers $E_1\circ E_0$ and builds a particular characteristic for $E$ with probability $p^2q^2$ by combining differential characteristics for ...
A Biryukov +21 more
core +2 more sources
Related-Key Impossible-Differential Attack on Reduced-Round Skinny [PDF]
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK.
Ankele, Ralph +6 more
core +2 more sources
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE [PDF]
Tweakable TWINE (T-TWINE) is a new lightweight tweakable block cipher family proposed by Sakamoto $et$ $al$. at IWSEC 2019. T-TWINE is the first Tweakable Block Cipher (TBC) that is built on Generalized Feistel Structure (GFS).
Tolba M, ElSheikh M, Youssef A.
europepmc +3 more sources
Design, realization and performance evaluation of a low latency high throughput authenticated encryption module [PDF]
LAUREA MAGISTRALELa necessità di sicurezza delle informazioni scambiate su Internet è al suo massimo. Anche le reti in fibra ottica, che compongono la spina dorsale di Internet ed erano considerate sicure, sono ora vulnerabili a tentativi di ...
dell'Oglio, Luca
core
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication [PDF]
We propose a new mode of operation called ZMAC allowing to construct a (stateless and deterministic) message authentication code (MAC) from a tweakable block cipher (TBC). When using a TBC with $n$-bit blocks and $t$-bit tweaks, our construction provides
A Biryukov +25 more
core +1 more source
Truncated Boomerang Attacks and Application to AES-based Ciphers [PDF]
The boomerang attack is a cryptanalysis technique that combines two short differentials instead of using a single long differential. It has been applied to many primitives, and results in the best known attacks against several AES-based ciphers (Kiasu-BC,
Augustin Bariant, Gaëtan Leurent
core
Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys [PDF]
The boomerang attack is a cryptanalysis technique that allows an attacker to concatenate two short differential characteristics. Several research results (ladder switch, S-box switch, sandwich attack, Boomerang Connectivity Table (BCT), ...) showed that ...
Haoyang Wang, Thomas Peyrin
core +2 more sources
A total of 16 chemically synthesized capsular polysaccharide (CPS) fragments related to Pseudomonas aeruginosa, Staphylococcus aureus, and Acinetobacter baumannii were analyzed by glycan microarray. Comparative screening revealed three conserved epitopes that act as cross‐protective vaccine lead candidates against multidrug‐resistant (MDR) bacterial ...
Amar Kumar Mishra +9 more
wiley +2 more sources
Chosen-Key Distinguishing Attacks on Full AES-192, AES-256, Kiasu-BC, and More [PDF]
At CRYPTO 2020, Liu et al. find that many differentials on Gimli are actually incompatible. On the related-key differential of AES, the incompatibilities also exist and are handled in different ad-hoc ways by adding respective constraints into the ...
Phuong Pham, Shun Li, Xiaoyang Dong
core
Design, Analysis, and Implementation of Symmetric-key (Authenticated) Ciphers [PDF]
Modern cryptography has become an often ubiquitous but essential part of our daily lives. Protocols for secure authentication and encryption protect our communication with various digital services, from private messaging, online shopping, to bank ...
List, Eik
core +1 more source

