Multiforked Iterated Even-Mansour and a Note on the Tightness of IEM Proofs [PDF]
The Iterated Even-Mansour (IEM) construction was introduced by Bogdanov et al. at EUROCRYPT 2012 and can be seen as an abstraction or idealization of blockciphers like AES.
Elena Andreeva +2 more
semanticscholar +3 more sources
Cryptanalysis of Tweakable Block Ciphers and Forkciphers [PDF]
INTERNSHIP REPORTInternational ...
Bariant, Augustin
openaire +3 more sources
Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation
IoT devices collect privacy-sensitive data, e.g., in smart grids or in medical devices, and send this data to cloud servers for further processing. In order to ensure confidentiality as well as authenticity of the sensor data in the untrusted cloud ...
Amit Singh Bhati +4 more
semanticscholar +1 more source
The Potential CC16 (Clara Cell Protein 16) as Biomarkers of Lung Damage in COVID-19 Survivors: Literature Review [PDF]
CC16 or Clara cell secretory protein-16 is a protein produced from the secretion of respiratory epithelial club cells, especially in the lungs. CC16 in several studies has anti-inflammatory effects and plays an important role in potential biomarkers and ...
Tri Anggraini, Fika
core +2 more sources
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule [PDF]
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today.
Keting Jia +4 more
core +2 more sources
Optimized Software Implementations for theLightweight Encryption Scheme ForkAE [PDF]
In this work we develop optimized software implementationsfor ForkAE, a second round candidate in the ongoing NIST lightweight cryptography standardization process.
Angshuman Karmakar +4 more
core +2 more sources
Nonce-Misuse Security of the SAEF Authenticated Encryption mode [PDF]
ForkAE is a NIST lightweight cryptography candidate that uses the forkcipher primitive in two modes of operation -- SAEF and PAEF -- optimized for authenticated encryption of the shortest messages.
Amit Singh Bhati +2 more
core
Forking Sums of Permutations for Optimally Secure and Highly Efficient PRFs [PDF]
The desirable encryption scheme possesses high PRF security, high efficiency, and the ability to produce variable-length outputs. Since designing dedicated secure PRFs is difficult, a series of works was devoted to building optimally secure PRFs from the
Avijit Dutta, Eik List, Jian Guo
core
RUP Security of the SAEF Authenticated Encryption mode [PDF]
ForkAE is a family of authenticated encryption (AE) schemes using a forkcipher as a building block. ForkAE was published in Asiacrypt\u2719 and is a second-round candidate in the NIST lightweight cryptography process.
Amit Singh Bhati +2 more
core
Revisiting Yoyo Tricks on AES [PDF]
At Asiacrypt 2017, Rønjom et al. presented key-independent distinguishers for different numbers of rounds of AES, ranging from 3 to 6 rounds, in their work titled “Yoyo Tricks with AES”.
Avishek Adhikari +3 more
core +2 more sources

