Results 71 to 80 of about 174 (95)

TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications [PDF]

open access: yes, 2019
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features: (i) It offers asymptotically optimal security in the multi-user setting.
Chun Guo   +4 more
core  

MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC [PDF]

open access: yes, 2019
In this paper, we study the relation of single-key impossible differentials with the related-tweakey/key ones and propose an interesting algorithm that can efficiently derive longer related-tweakey/key impossible differentials from single-key ones.
Rui Zong, Xiaoyang Dong
core  

A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers [PDF]

open access: yes
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) schemes based on a tweakable block cipher (TBC). The starting point of our work is an analysis of the mu security of the SCT-II mode which underlies the ...
Benoît Cogliati   +3 more
core   +1 more source

Optimally Secure TBC Based Accordion Mode [PDF]

open access: yes
The design of tweakable wide block ciphers has advanced significantly over the past two decades. This evolution began with the approach of designing a wide block cipher by Naor and Reingold.
Avijit Dutta   +3 more
core  

General Classification of the Authenticated Encryption Schemes for the CAESAR Competition [PDF]

open access: yes, 2016
An Authenticated encryption scheme is a scheme which provides privacy and integrity by using a secret key. In 2013, CAESAR (the ``Competition for Authenticated Encryption: Security, Applicability, and Robustness\u27\u27) was co-founded by NIST and Dan ...
Christian Forler   +2 more
core  

Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC [PDF]

open access: yes, 2016
Kiasu-BC is a tweakable block cipher proposed by Jean et al. at ASIACRYPT 2014 alongside their TWEAKEY framework. The cipher is almost identical to the AES-128 except for the tweak, which renders it an attractive primitive for various modes of operation ...
Christoph Dobraunig, Eik List
core  

A Note on the use of the Double Boomerang Connectivity Table (DBCT) for Spotting Impossibilities [PDF]

open access: yes
In this short note we examine one of the impossible boomerang distinguishers of Skinny-128-384 provided by Zhang, Wang and Tang at ToSC 2024 Issue 2 and disprove it.
Virginie Lallemand, Xavier Bonnetain
core  

Towards Optimally Secure Deterministic Authenticated Encryption Schemes [PDF]

open access: yes
The public comments received for the review process for NIST (SP) 800-38A pointed out two important issues that most companies face: (1) the limited security that AES can provide due to its 128-bit block size and (2) the problem of nonce-misuse in ...
Ashwin Jha   +3 more
core  

Rugged Pseudorandom Permutations with Beyond-Birthday-Bound Security [PDF]

open access: yes
A rugged pseudorandom permutation (RPRP) is a security notion for variable-length tweakable ciphers that is strictly weaker than the traditional notion of a strong pseudorandom permutation.
Avijit Dutta   +4 more
core  

New Exchanged Boomerang Distinguishers for 5-Round AES [PDF]

open access: yes
In block ciphers, the attacker should not be able to distinguish a block cipher from a random permutation, making the existence of a distinguisher important.
Deukjo Hong   +5 more
core  

Home - About - Disclaimer - Privacy