Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks [PDF]
At EUROCRYPT 2021, Bao et al. proposed an automatic method for systematically exploring the configuration space of meet-in-the-middle (MITM) preimage attacks.
Jialiang Hua +5 more
core
Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs [PDF]
A message authentication code (MAC) is a symmetric-key cryptographic function used to authenticate a message by assigning it a tag. This tag is a short string that is difficult to reproduce without knowing the key.
Amit Singh Bhati +3 more
core
Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD [PDF]
Pseudo-Random Injections (PRIs) have been used in several applications in symmetric-key cryptography, such as in the idealization of Authenticated Encryption with Associated Data (AEAD) schemes, building robust AEAD, and, recently, in converting a ...
Mustafa Khairallah
core +3 more sources
Populating the Zoo of Rugged Pseudorandom Permutations [PDF]
A Rugged Pseudorandom Permutation (RPRP) is a variable-input-length tweakable cipher satisfying a security notion that is intermediate between tweakable PRP and tweakable SPRP. It was introduced at CRYPTO 2022 by Degabriele and Karadžić, who additionally
Jean Paul Degabriele +1 more
core
From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications [PDF]
The area of multi-party computation (MPC) has recently increased in popularity and number of use cases. At the current state of the art, Ciminion, a Farfalle-like cryptographic function, achieves the best performance in MPC applications involving ...
Lorenzo Grassi +3 more
core
Quantum impossible differential attack. Applications to CLEFIA, AES and SKINNY [PDF]
International audienceThe general context Cryptography is a computer discipline that aims to protect messages through encryption systems. In symmetric cryptography, a secret parameter, called a key, is used both to encrypt and to decrypt messages.
David, Nicolas
core +1 more source
Cymric: Short-tailed but Mighty [PDF]
Authenticated encryption (AE) is a fundamental tool in today’s secure communication. Numerous designs have been proposed, including well-known standards such as GCM.
Alexandre Adomnicăi +4 more
core +6 more sources
Lightweight Yet Nonce-Misuse Secure Authenticated Encryption for Very Short Inputs [PDF]
We study authenticated encryption (AE) modes dedicated to very short messages, which are crucial for Internet of Things applications. One of the most popular class of AE is built on block ciphers, namely a mode of operation.
0000-0002-3427-6772 +5 more
core +1 more source
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks [PDF]
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we find the right quartets which may suggest key candidates have to satisfy some nonlinear relations. However, some quartets generated always violate these relations,
Lingyue Qin +3 more
core
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers [PDF]
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) schemes based on a tweakable block cipher (TBC). The starting point of our work is an analysis of the mu security of the SCT-II mode which underlies the ...
Benoît Cogliati +3 more
core +1 more source

