Results 71 to 80 of about 153 (84)

A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers [PDF]

open access: yes
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) schemes based on a tweakable block cipher (TBC). The starting point of our work is an analysis of the mu security of the SCT-II mode which underlies the ...
Benoît Cogliati   +3 more
core   +1 more source

Optimally Secure TBC Based Accordion Mode [PDF]

open access: yes
The design of tweakable wide block ciphers has advanced significantly over the past two decades. This evolution began with the approach of designing a wide block cipher by Naor and Reingold.
Avijit Dutta   +3 more
core  

General Classification of the Authenticated Encryption Schemes for the CAESAR Competition [PDF]

open access: yes, 2016
An Authenticated encryption scheme is a scheme which provides privacy and integrity by using a secret key. In 2013, CAESAR (the ``Competition for Authenticated Encryption: Security, Applicability, and Robustness\u27\u27) was co-founded by NIST and Dan ...
Christian Forler   +2 more
core  

Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC [PDF]

open access: yes, 2016
Kiasu-BC is a tweakable block cipher proposed by Jean et al. at ASIACRYPT 2014 alongside their TWEAKEY framework. The cipher is almost identical to the AES-128 except for the tweak, which renders it an attractive primitive for various modes of operation ...
Christoph Dobraunig, Eik List
core  

A Note on the use of the Double Boomerang Connectivity Table (DBCT) for Spotting Impossibilities [PDF]

open access: yes
In this short note we examine one of the impossible boomerang distinguishers of Skinny-128-384 provided by Zhang, Wang and Tang at ToSC 2024 Issue 2 and disprove it.
Virginie Lallemand, Xavier Bonnetain
core  

Towards Optimally Secure Deterministic Authenticated Encryption Schemes [PDF]

open access: yes
The public comments received for the review process for NIST (SP) 800-38A pointed out two important issues that most companies face: (1) the limited security that AES can provide due to its 128-bit block size and (2) the problem of nonce-misuse in ...
Ashwin Jha   +3 more
core  

Rugged Pseudorandom Permutations with Beyond-Birthday-Bound Security [PDF]

open access: yes
A rugged pseudorandom permutation (RPRP) is a security notion for variable-length tweakable ciphers that is strictly weaker than the traditional notion of a strong pseudorandom permutation.
Avijit Dutta   +4 more
core  

New Exchanged Boomerang Distinguishers for 5-Round AES [PDF]

open access: yes
In block ciphers, the attacker should not be able to distinguish a block cipher from a random permutation, making the existence of a distinguisher important.
Deukjo Hong   +5 more
core  

Impossible Differential Cryptanalysis on Deoxys-BC-256 [PDF]

open access: yes, 2018
Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal ...
Moazami, F.   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy