Results 51 to 58 of about 118 (58)

ChiLow and ChiChi: New Constructions for Code Encryption [PDF]

open access: yes
We study the problem of embedded code encryption, i.e., encryption for binary software code for a secure microcontroller that is stored in an insecure external memory. As every single instruction must be decrypted before it can be executed, this scenario
Damian Vizár   +10 more
core  

Optimally Secure TBC Based Accordion Mode [PDF]

open access: yes
The design of tweakable wide block ciphers has advanced significantly over the past two decades. This evolution began with the approach of designing a wide block cipher by Naor and Reingold.
Avijit Dutta   +3 more
core  
Some of the next articles are maybe not open access.

Related searches:

A Forkcipher-Based Pseudo-Random Number Generator

International Conference on Applied Cryptography and Network Security, 2023
E. Andreeva, Andreas Weninger
semanticscholar   +2 more sources

The Large Block Cipher Vistrutah

IACR Transactions on Symmetric Cryptology
Vistrutah is a block cipher with block sizes of 256 and 512 bits. It iterates a step function consisting of two AES rounds applied to each 128-bit block of the state, followed by a state-wide cell permutation.
Roberto Avanzi   +3 more
semanticscholar   +1 more source

sfPAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation

IACR Cryptology ePrint Archive, 2023
Arghya Bhattacharjee   +3 more
semanticscholar   +1 more source

Nonce-Misuse Security of the SAEF Authenticated Encryption mode

IACR Cryptology ePrint Archive, 2020
E. Andreeva, A. Bhati, Damian Vizár
semanticscholar   +1 more source

Cryptanalysis of ForkAES

IACR Cryptology ePrint Archive, 2019
S. Banik   +8 more
semanticscholar   +1 more source

Forking sums of permutations for highly secure and efficient PRFs

Designs, Codes and Cryptography
Avijit Dutta, Eik List
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy