Results 11 to 20 of about 153 (84)

Boomerang Connectivity Table:A New Cryptanalysis Tool [PDF]

open access: yes, 2018
A boomerang attack is a cryptanalysis framework that regards a block cipher $E$ as the composition of two sub-ciphers $E_1\circ E_0$ and builds a particular characteristic for $E$ with probability $p^2q^2$ by combining differential characteristics for ...
A Biryukov   +21 more
core   +2 more sources

Related-Key Impossible-Differential Attack on Reduced-Round Skinny [PDF]

open access: yes, 2017
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK.
Ankele, Ralph   +6 more
core   +2 more sources

Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE [PDF]

open access: yesProgress in Cryptology - AFRICACRYPT 202012th International Conference on Cryptology in Africa, 2020
Tweakable TWINE (T-TWINE) is a new lightweight tweakable block cipher family proposed by Sakamoto $et$ $al$. at IWSEC 2019. T-TWINE is the first Tweakable Block Cipher (TBC) that is built on Generalized Feistel Structure (GFS).
Tolba M, ElSheikh M, Youssef A.
europepmc   +3 more sources

Design, realization and performance evaluation of a low latency high throughput authenticated encryption module [PDF]

open access: yes, 2022
LAUREA MAGISTRALELa necessità di sicurezza delle informazioni scambiate su Internet è al suo massimo. Anche le reti in fibra ottica, che compongono la spina dorsale di Internet ed erano considerate sicure, sono ora vulnerabili a tentativi di ...
dell'Oglio, Luca
core  

ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication [PDF]

open access: yes, 2017
We propose a new mode of operation called ZMAC allowing to construct a (stateless and deterministic) message authentication code (MAC) from a tweakable block cipher (TBC). When using a TBC with $n$-bit blocks and $t$-bit tweaks, our construction provides
A Biryukov   +25 more
core   +1 more source

Truncated Boomerang Attacks and Application to AES-based Ciphers [PDF]

open access: yes, 2023
The boomerang attack is a cryptanalysis technique that combines two short differentials instead of using a single long differential. It has been applied to many primitives, and results in the best known attacks against several AES-based ciphers (Kiasu-BC,
Augustin Bariant, Gaëtan Leurent
core  

Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys [PDF]

open access: yes, 2019
The boomerang attack is a cryptanalysis technique that allows an attacker to concatenate two short differential characteristics. Several research results (ladder switch, S-box switch, sandwich attack, Boomerang Connectivity Table (BCT), ...) showed that ...
Haoyang Wang, Thomas Peyrin
core   +2 more sources

Chemical Synthesis of Pseudomonas aeruginosa, Staphylococcus aureus, and Acinetobacter baumannii Capsular Polysaccharide Fragments as Leads for Cross‐Protection

open access: yesAngewandte Chemie, Volume 138, Issue 6, 2 February 2026.
A total of 16 chemically synthesized capsular polysaccharide (CPS) fragments related to Pseudomonas aeruginosa, Staphylococcus aureus, and Acinetobacter baumannii were analyzed by glycan microarray. Comparative screening revealed three conserved epitopes that act as cross‐protective vaccine lead candidates against multidrug‐resistant (MDR) bacterial ...
Amar Kumar Mishra   +9 more
wiley   +2 more sources

Chosen-Key Distinguishing Attacks on Full AES-192, AES-256, Kiasu-BC, and More [PDF]

open access: yes, 2023
At CRYPTO 2020, Liu et al. find that many differentials on Gimli are actually incompatible. On the related-key differential of AES, the incompatibilities also exist and are handled in different ad-hoc ways by adding respective constraints into the ...
Phuong Pham, Shun Li, Xiaoyang Dong
core  

Design, Analysis, and Implementation of Symmetric-key (Authenticated) Ciphers [PDF]

open access: yes, 2021
Modern cryptography has become an often ubiquitous but essential part of our daily lives. Protocols for secure authentication and encryption protect our communication with various digital services, from private messaging, online shopping, to bank ...
List, Eik
core   +1 more source

Home - About - Disclaimer - Privacy