Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm [PDF]
Kiasu-BC algorithm is an internal tweakable block cipher of authenticated encryption algorithm Kiasu as one of first-round candidates in the CAESAR competition.The precomputation complexity is reduced by utilizing the freedom of the tweak and the ...
Manman LI, Shaozhen CHEN
core +1 more source
Related-Key Impossible-Differential Attack on Reduced-Round Skinny [PDF]
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK.
Ankele, Ralph +6 more
core +2 more sources
Criptografia Autenticada -Uma breve análise dos concorrentes do CAESAR [PDF]
This survey seeks to briefly introduce the branch of authenticated cryptography as well as the concepts of "lightweight cryptography"; Or lightweight cryptography, presenting a brief description of the CAESAR participating algorithms, as well as ...
dos Santos, Luan Cardoso
core +2 more sources
Three Input Exclusive-OR Gate Support For Boyar-Peralta\u27s Algorithm (Extended Version) [PDF]
The linear layer, which is basically a binary non-singular matrix, is an integral part of cipher construction in a lot of private key ciphers. As a result, optimising the linear layer for device implementation has been an important research direction for
Anubhab Baksi +4 more
core
On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing [PDF]
In this paper, we provide the first analysis of the Iterated Tweakable Even-Mansour cipher with linear tweak and key (or tweakey) mixing, henceforth referred as TEML, for an arbitrary tweak(ey) size kn for all k ≥ 1, and arbitrary number of rounds r ≥ 2.
Ashwin Jha +3 more
core +2 more sources
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication [PDF]
We propose a new mode of operation called ZMAC allowing to construct a (stateless and deterministic) message authentication code (MAC) from a tweakable block cipher (TBC). When using a TBC with $n$-bit blocks and $t$-bit tweaks, our construction provides
A Biryukov +25 more
core +1 more source
Square Attack on 7-Round Kiasu-BC [PDF]
Kiasu-BC is a tweakable block cipher presented within the TWEAKEY framework at AsiaCrypt 2014. Kiasu-BC is almost identical to AES-128, the only difference to AES-128 is the tweak addition, where the 64-bit tweak is xored to the first two rows of every ...
Christoph Dobraunig +2 more
core +2 more sources
A Holistic Framework for Impossible Boomerang Attacks [PDF]
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques.
Jiahao Zhao +5 more
core +2 more sources
The Tweakable Block Cipher Family QARMAv2 [PDF]
We introduce the tweakable block cipher QARMAv2. It is a redesign of QARMA to improve its security bounds and allow for longer tweaks, while keeping similar latency and area. The wider tweak input caters to both specific use cases and the design of modes
Francesco Regazzoni +6 more
core
Differential Cryptanalysis of the Reduced Pointer Authentication Code Function used in Arm’s FEAT_PACQARMA3 Feature [PDF]
The Pointer Authentication Code ($\textsf{PAC}$) feature in the Arm architecture is used to enforce the Code Flow Integrity ($\textsf{CFI}$) of running programs.
Orr Dunkelman +2 more
core +5 more sources

