A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers [PDF]
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) schemes based on a tweakable block cipher (TBC). The starting point of our work is an analysis of the mu security of the SCT-II mode which underlies the ...
Benoît Cogliati +3 more
core +1 more source
Optimally Secure TBC Based Accordion Mode [PDF]
The design of tweakable wide block ciphers has advanced significantly over the past two decades. This evolution began with the approach of designing a wide block cipher by Naor and Reingold.
Avijit Dutta +3 more
core
Abstracts of the 18th SCWD Conference, 11‐13 December 2025 in Rome/Italy
JCSM Communications, Volume 9, Issue 1, January/June 2026.
wiley +1 more source
General Classification of the Authenticated Encryption Schemes for the CAESAR Competition [PDF]
An Authenticated encryption scheme is a scheme which provides privacy and integrity by using a secret key. In 2013, CAESAR (the ``Competition for Authenticated Encryption: Security, Applicability, and Robustness\u27\u27) was co-founded by NIST and Dan ...
Christian Forler +2 more
core
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC [PDF]
Kiasu-BC is a tweakable block cipher proposed by Jean et al. at ASIACRYPT 2014 alongside their TWEAKEY framework. The cipher is almost identical to the AES-128 except for the tweak, which renders it an attractive primitive for various modes of operation ...
Christoph Dobraunig, Eik List
core
A Note on the use of the Double Boomerang Connectivity Table (DBCT) for Spotting Impossibilities [PDF]
In this short note we examine one of the impossible boomerang distinguishers of Skinny-128-384 provided by Zhang, Wang and Tang at ToSC 2024 Issue 2 and disprove it.
Virginie Lallemand, Xavier Bonnetain
core
Towards Optimally Secure Deterministic Authenticated Encryption Schemes [PDF]
The public comments received for the review process for NIST (SP) 800-38A pointed out two important issues that most companies face: (1) the limited security that AES can provide due to its 128-bit block size and (2) the problem of nonce-misuse in ...
Ashwin Jha +3 more
core
Rugged Pseudorandom Permutations with Beyond-Birthday-Bound Security [PDF]
A rugged pseudorandom permutation (RPRP) is a security notion for variable-length tweakable ciphers that is strictly weaker than the traditional notion of a strong pseudorandom permutation.
Avijit Dutta +4 more
core
New Exchanged Boomerang Distinguishers for 5-Round AES [PDF]
In block ciphers, the attacker should not be able to distinguish a block cipher from a random permutation, making the existence of a distinguisher important.
Deukjo Hong +5 more
core
Impossible Differential Cryptanalysis on Deoxys-BC-256 [PDF]
Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal ...
Moazami, F. +2 more
openaire +3 more sources

