Revisiting Leakage-Resilient MACs and Succinctly-Committing AEAD: More Applications of Pseudo-Random Injections [PDF]
Pseudo-Random Injections (PRIs) have been used in several applications in symmetric-key cryptography, such as in the idealization of Authenticated Encryption with Associated Data (AEAD) schemes, building robust AEAD, and, recently, in converting a ...
Mustafa Khairallah
core
Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV [PDF]
MRAE security is an important goal for many AEAD applications where the nonce uniqueness cannot be maintained and security risks are significant. However, MRAE schemes can be quite expensive. Two of the SoTA MRAE-secure schemes; Deoxys-II and AES-GCM-SIV
Mustafa Khairallah
core
A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme- [PDF]
Tweakable HCTR is an tweakable enciphering proposed by Dutta and Nandi in Indocrypt 2018. It provides beyond birthday bound security when each tweak value is not used too frequently.
Mustafa Khairallah
core
Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY [PDF]
Impossible differential cryptanalysis is a crucial cryptanalytical method for symmetric ciphers. Given an impossible differential, the key recovery attack typically proceeds in two steps: generating pairs of data and then identifying wrong keys using the
Lei Hu +4 more
core
PRGUE Schemes: Efficient Updatable Encryption With Robust Security From Symmetric Primitives [PDF]
Securing sensitive data for long-term storage in the cloud is a challenging problem. Updatable encryption (UE) enables changing the encryption key of encrypted data in the cloud while the plaintext and all versions of the key remain secret from the cloud
Andreas Weninger, Elena Andreeva
core
Yoyo tricks with a BEANIE [PDF]
BEANIE is a 32-bit tweakable block cipher, published in ToSC 2025.4, designed for memory encryption of microcontroller units. In this paper, we propose its first third-party analysis and present a key recovery against the full 5+5 rounds of BEANIE using ...
Sébastien Duval +5 more
core
Provably Secure Online Authenticated Encryption and Bidirectional Online Channels [PDF]
In this work, we examine online authenticated encryption with variable expansion. We follow a notion where both encryption and decryption are online, and security is ensured in the RUP (Release of Unverified Plaintext) setting.
Arghya Bhattacharjee +3 more
core
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond [PDF]
In differential-like attacks, the process typically involves extending a distinguisher forward and backward with probability 1 for some rounds and recovering the key involved in the extended part.
Jian Weng +4 more
core
ZLR: a fast online authenticated encryption scheme achieving full security [PDF]
Online authenticated encryption has been considered of practical relevance in light-weight environments due to low latency and constant memory usage.
Byeonghak Lee +3 more
core
Breaking, Repairing and Enhancing XCBv2 into the Tweakable Enciphering Mode GEM [PDF]
Tweakable enciphering modes (TEMs) provide security in a variety of storage and space-critical applications like disk and file-based encryption, and packet-based communication protocols, among others.
Amit Singh Bhati +2 more
core

