Results 51 to 58 of about 118 (58)
ChiLow and ChiChi: New Constructions for Code Encryption [PDF]
We study the problem of embedded code encryption, i.e., encryption for binary software code for a secure microcontroller that is stored in an insecure external memory. As every single instruction must be decrypted before it can be executed, this scenario
Damian Vizár +10 more
core
Optimally Secure TBC Based Accordion Mode [PDF]
The design of tweakable wide block ciphers has advanced significantly over the past two decades. This evolution began with the approach of designing a wide block cipher by Naor and Reingold.
Avijit Dutta +3 more
core
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A Forkcipher-Based Pseudo-Random Number Generator
International Conference on Applied Cryptography and Network Security, 2023E. Andreeva, Andreas Weninger
semanticscholar +2 more sources
The Large Block Cipher Vistrutah
IACR Transactions on Symmetric CryptologyVistrutah is a block cipher with block sizes of 256 and 512 bits. It iterates a step function consisting of two AES rounds applied to each 128-bit block of the state, followed by a state-wide cell permutation.
Roberto Avanzi +3 more
semanticscholar +1 more source
sfPAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation
IACR Cryptology ePrint Archive, 2023Arghya Bhattacharjee +3 more
semanticscholar +1 more source
Nonce-Misuse Security of the SAEF Authenticated Encryption mode
IACR Cryptology ePrint Archive, 2020E. Andreeva, A. Bhati, Damian Vizár
semanticscholar +1 more source
Forking sums of permutations for highly secure and efficient PRFs
Designs, Codes and CryptographyAvijit Dutta, Eik List
semanticscholar +1 more source

