Results 31 to 40 of about 118 (58)

Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks [PDF]

open access: yes, 2021
At EUROCRYPT 2021, Bao et al. proposed an automatic method for systematically exploring the configuration space of meet-in-the-middle (MITM) preimage attacks.
Jialiang Hua   +5 more
core  

Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs [PDF]

open access: yes
A message authentication code (MAC) is a symmetric-key cryptographic function used to authenticate a message by assigning it a tag. This tag is a short string that is difficult to reproduce without knowing the key.
Amit Singh Bhati   +3 more
core  

Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD [PDF]

open access: yes
Pseudo-Random Injections (PRIs) have been used in several applications in symmetric-key cryptography, such as in the idealization of Authenticated Encryption with Associated Data (AEAD) schemes, building robust AEAD, and, recently, in converting a ...
Mustafa Khairallah
core   +3 more sources

Populating the Zoo of Rugged Pseudorandom Permutations [PDF]

open access: yes, 2023
A Rugged Pseudorandom Permutation (RPRP) is a variable-input-length tweakable cipher satisfying a security notion that is intermediate between tweakable PRP and tweakable SPRP. It was introduced at CRYPTO 2022 by Degabriele and Karadžić, who additionally
Jean Paul Degabriele   +1 more
core  

From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications [PDF]

open access: yes, 2023
The area of multi-party computation (MPC) has recently increased in popularity and number of use cases. At the current state of the art, Ciminion, a Farfalle-like cryptographic function, achieves the best performance in MPC applications involving ...
Lorenzo Grassi   +3 more
core  

Quantum impossible differential attack. Applications to CLEFIA, AES and SKINNY [PDF]

open access: yes, 2019
International audienceThe general context Cryptography is a computer discipline that aims to protect messages through encryption systems. In symmetric cryptography, a secret parameter, called a key, is used both to encrypt and to decrypt messages.
David, Nicolas
core   +1 more source

Cymric: Short-tailed but Mighty [PDF]

open access: yes
Authenticated encryption (AE) is a fundamental tool in today’s secure communication. Numerous designs have been proposed, including well-known standards such as GCM.
Alexandre Adomnicăi   +4 more
core   +6 more sources

Lightweight Yet Nonce-Misuse Secure Authenticated Encryption for Very Short Inputs [PDF]

open access: yes
We study authenticated encryption (AE) modes dedicated to very short messages, which are crucial for Internet of Things applications. One of the most popular class of AE is built on block ciphers, namely a mode of operation.
0000-0002-3427-6772   +5 more
core   +1 more source

Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks [PDF]

open access: yes, 2022
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we find the right quartets which may suggest key candidates have to satisfy some nonlinear relations. However, some quartets generated always violate these relations,
Lingyue Qin   +3 more
core  

A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers [PDF]

open access: yes
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) schemes based on a tweakable block cipher (TBC). The starting point of our work is an analysis of the mu security of the SCT-II mode which underlies the ...
Benoît Cogliati   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy