Results 21 to 30 of about 118 (58)

HOP-1 and HOP-2: New Re-keying Schemes for Symmetric Ciphers [PDF]

open access: yes
Re-keying is one of the most effective techniques to protect symmetric ciphers against side-channel attacks. Since its introduction, numerous re-keying schemes have been developed.
Donghoon Chang   +3 more
core   +1 more source

Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function [PDF]

open access: yes, 2022
Many modes of operations for block ciphers or tweakable block ciphers do not require invertibility from their underlying primitive. In this work, we study fixed-length Tweakable Pseudorandom Function (TPRF) with large domain extension, a novel primitive ...
Antoon Purnal   +5 more
core  

Power Yoga: Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT [PDF]

open access: yes, 2021
The currently ongoing NIST LWC project aims at identifying new standardization targets for lightweight authenticated encryption with associated data (AEAD) and (optionally) lightweight cryptographic hashing.
Damian Vizár   +2 more
core   +2 more sources

A TPRF-based pseudo-random number generator

open access: yesJournal of Surveillance, Security and Safety
Most cryptographic applications use randomness that is generated by pseudo-random number generators (PRNGs). A popular PRNG practical choice is the NIST standardized $$ \rm{CTR\_DRBG}$$ .
Elena Andreeva, Andreas Weninger
semanticscholar   +1 more source

SECURITY ANALYSIS OF LIGHTWEIGHT CRYPTOGRAPHIC ALGORITHMS [PDF]

open access: yes
The paper examines three lightweight cryptographic algorithms - SKINNY, ForkAE, and Romulus. The research focuses on evaluating their security against various cryptographic attacks. Methods used: theoretical analysis and summary.
Dimitrov, Ivaylo, Dimitrova, Dilyana
core   +3 more sources

Vulnerabilities of the Artificial Pancreas System and Proposed Cryptographic Solutions [PDF]

open access: yes, 2020
Type I Diabetes Mellitus is the most common form of diabetes in people under the age of 30. Current treatment for Type I Diabetes Mellitus includes lifelong monitoring of blood glucose levels and administration of insulin injections, but medical advances
Babinkostova, Liljana   +11 more
core   +1 more source

INT-RUP Security of SAEB and TinyJAMBU [PDF]

open access: yes, 2022
The INT-RUP security of an authenticated encryption (AE) scheme is a well studied problem which deals with the integrity security of an AE scheme in the setting of releasing unverified plaintext model.
Avijit Dutta   +2 more
core  

Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny [PDF]

open access: yes, 2021
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today.
Keting Jia   +4 more
core  

Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2 [PDF]

open access: yes, 2023
Integral, impossible-differential (ID), and zero-correlation (ZC) attacks are three of the most important attacks on block ciphers. However, manually finding these attacks can be a daunting task, which is why automated methods are becoming increasingly ...
Hosein Hadipour   +3 more
core  

Authenticated Encryption for Very Short Inputs [PDF]

open access: yes, 2023
We study authenticated encryption (AE) modes dedicated to very short messages, which are crucial for Internet-of-things applications. Since the existing general-purpose AE modes need at least three block cipher calls for non-empty messages, we explore ...
Alexandre Adomnicai   +2 more
core  

Home - About - Disclaimer - Privacy