Results 31 to 40 of about 70 (49)

General Classification of the Authenticated Encryption Schemes for the CAESAR Competition [PDF]

open access: yes, 2016
An Authenticated encryption scheme is a scheme which provides privacy and integrity by using a secret key. In 2013, CAESAR (the ``Competition for Authenticated Encryption: Security, Applicability, and Robustness\u27\u27) was co-founded by NIST and Dan ...
Christian Forler   +2 more
core  

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion [PDF]

open access: yes, 2019
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights.
Christoph Dobraunig   +5 more
core   +3 more sources

The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes [PDF]

open access: yes, 2017
This paper introduces QARMA, a new family of lightweight tweakable block ciphers targeted at applications such as memory encryption, the generation of very short tags for hardware-assisted prevention of software exploitation, and the construction of ...
Roberto Avanzi
core   +2 more sources

Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications [PDF]

open access: yes, 2023
The most crucial but time-consuming task for differential cryptanalysis is to find a differential with a high probability. To tackle this task, we propose a new SAT-based automatic search framework to efficiently figure out a differential with the ...
Kosei Sakamoto   +2 more
core  

Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY [PDF]

open access: yes
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack.
Deng Tang, Haoyang Wang, Jianing Zhang
core  

Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch [PDF]

open access: yes, 2016
Block-cipher-based authenticated encryption has obtained considerable attention from the ongoing CAESAR competition. While the focus of CAESAR resides primarily on nonce-based authenticated encryption, Deterministic Authenticated Encryption (DAE) is used
Christian Forler   +3 more
core  

A Note on the use of the Double Boomerang Connectivity Table (DBCT) for Spotting Impossibilities [PDF]

open access: yes
In this short note we examine one of the impossible boomerang distinguishers of Skinny-128-384 provided by Zhang, Wang and Tang at ToSC 2024 Issue 2 and disprove it.
Virginie Lallemand, Xavier Bonnetain
core  

New Records for Practical-data Chosen-plaintext Attacks on Round-reduced AES [PDF]

open access: yes
As probably the most widespread block cipher, the AES has attracted tremendous cryptanalytical efforts since its standardization. In the single secret-key setting, Demirci-Selcuk Meet-in-the-Middle (DS-MitM) attacks have remained the state of the art on ...
Eik List   +3 more
core   +1 more source

MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes [PDF]

open access: yes, 2018
Cube-attack-like cryptanalysis was proposed by Dinur et al. at EUROCRYPT 2015, which recovers the key of Keccak keyed modes in a divide-and-conquer manner. In their attack, one selects cube variables manually, which leads to more key bits involved in the
Rui Zong   +4 more
core  

Security of Ubiquitous Computing Systems [PDF]

open access: yes
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework.

core   +1 more source

Home - About - Disclaimer - Privacy