Results 1 to 10 of about 70 (49)
MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC [PDF]
In this paper, we study the relation of related-tweak/key impossible differentials with single-key ones. Following a heuristic strategy, we can derive longer related-tweak/key impossible differentials from single-key ones. We implement this strategy with
Rui Zong, Xiaoyang Dong
doaj +9 more sources
Improved meet‐in‐the‐middle attacks on reduced‐round Joltik‐BC [PDF]
Joltik‐BC is an internal tweakable block cipher of the authenticated encryption algorithm Joltik, which was a second‐round finalist in the CAESAR competition.
Manman Li, Shaozhen Chen
doaj +6 more sources
Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC [PDF]
AbstractKiasu-BC and Joltik-BC are internal tweakable block ciphers of authenticated encryption algorithms Kiasu and Joltik submitted to the CAESAR competition. Kiasu-BC is a 128-bit block cipher, of which tweak and key sizes are 64 and 128 bits, respectively. Joltik-BC-128 is a 64-bit lightweight block cipher supporting 128 bits tweakey. Its designers
Ya Liu +7 more
exaly +7 more sources
Impossible Boomerang Attacks Revisited
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack. In
Jianing Zhang, Haoyang Wang, Deng Tang
doaj +3 more sources
Improved meet-in-the-middle attack on Joltik-BC-128
The Joltik-BC, adopting the substitution-permutation network structure and Tweakey framework, was a lightweight tweakable block cipher published at ASIACRPYPT 2014. By researching the internal characteristic of the Joltik-BC, a 6-round meet-in-the-middle
LI Zheng +3 more
doaj +1 more source
Key recovery attacks on reduced-round Joltik-BC in the single-key setting
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Rongjia, Jin, Chenhui, Pan, Hongchen
exaly +6 more sources
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis [PDF]
The design and analysis of dedicated tweakable block ciphers constitute a dynamic and relatively recent research field in symmetric cryptanalysis. The assessment of security in the related-tweakey model is of utmost importance owing to the existence of a
Huiqin Chen, Yongqiang Li
exaly +2 more sources
Some of the next articles are maybe not open access.
Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BC
Lecture Notes in Computer ScienceKangkang Shi +2 more
openaire +3 more sources
MILP‐aided bit‐based division property for primitives with non‐bit‐permutation linear layers
IET Information Security, 2020Ling Sun
exaly

