Results 61 to 70 of about 174 (95)

Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption [PDF]

open access: yes, 2017
In this paper, we investigate the efficiency of FPGA implementations of AES and AES-like ciphers, specially in the context of authenticated encryption. We consider the encryption/decryption and the authentication/verification structures of OCB-like modes
Anupam Chattopadhyay   +2 more
core  

Integral attacks on reduced-round Deoxys-BC and RAIN algorithms

open access: yesTongxin xuebao
Considering the impact of tweakeys on tweakable block cipher algorithms, achieved integral attacks on Deoxys-BC and RAIN algorithms by combining zero-correlation linear cryptanalysis with integral attacks and utilizing partial-sum technique. 176 types of
Du Xiaoni   +3 more
doaj  

Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule: Applications to SKINNY and GIFT [PDF]

open access: yes, 2020
This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers with linear key schedule. As a proof of work, we apply
Boxin Zhao   +4 more
core  

Square Attack on 7-Round Kiasu-BC [PDF]

open access: yes, 2016
Kiasu-BC is a tweakable block cipher presented within the TWEAKEY framework at AsiaCrypt 2014. Kiasu-BC is almost identical to AES-128, the only difference to AES-128 is the tweak addition, where the 64-bit tweak is xored to the first two rows of every ...
Christoph Dobraunig   +2 more
core   +2 more sources

Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond [PDF]

open access: yes
In differential-like attacks, the process typically involves extending a distinguisher forward and backward with probability 1 for some rounds and recovering the key involved in the extended part.
Jian Weng   +4 more
core  

Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256 [PDF]

open access: yes, 2022
This paper introduces structure to key, in the related-key attack settings. While the idea of structure has been long used in keyrecovery attacks against block ciphers to enjoy the birthday effect, the same had not been applied to key materials due to ...
Haoyang Wang, Jian Guo, Ling Song
core  

Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch [PDF]

open access: yes, 2016
Block-cipher-based authenticated encryption has obtained considerable attention from the ongoing CAESAR competition. While the focus of CAESAR resides primarily on nonce-based authenticated encryption, Deterministic Authenticated Encryption (DAE) is used
Christian Forler   +3 more
core  

Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery [PDF]

open access: yes
The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as efficiently as possible.
Danping Shi   +7 more
core  

Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE [PDF]

open access: yes, 2023
The signed difference is a powerful tool for analyzing the Addition, XOR, Rotation (ARX) cryptographic primitives. Currently, solving the accurate model for the signed difference propagation is infeasible.
Lin Jiao   +3 more
core  

Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool [PDF]

open access: yes
Impossible differential (ID) cryptanalysis and impossible boomerang (IB) cryptanalysis are two methods of impossible cryptanalysis against block ciphers. Since the seminal work introduced by Boura et al.
Haoyang Wang, Jianing Zhang
core  

Home - About - Disclaimer - Privacy