Criptografia Autenticada -Uma breve análise dos concorrentes do CAESAR [PDF]
This survey seeks to briefly introduce the branch of authenticated cryptography as well as the concepts of "lightweight cryptography"; Or lightweight cryptography, presenting a brief description of the CAESAR participating algorithms, as well as ...
dos Santos, Luan Cardoso
core +2 more sources
ISAP – Towards Side-Channel Secure Authenticated Encryption [PDF]
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to counteract such attacks are cryptographic schemes based on fresh re-keying. In settings of pre-shared
Christoph Dobraunig +4 more
core +2 more sources
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes [PDF]
Cube-attack-like cryptanalysis was proposed by Dinur et al. at EUROCRYPT 2015, which recovers the key of Keccak keyed modes in a divide-and-conquer manner. In their attack, one selects cube variables manually, which leads to more key bits involved in the
Rui Zong +4 more
core
GAYA KOMUNIKASI SARKASME DI FACEBOOK FANPAGE LIVERPOOL GARIS KERAS [PDF]
Liverpool Garis Keras begitu populer di fanpage bola hiburan Indonesia. Gaya komunikasi yang dimiliki fanpage Liverpool Garis Keras menjadi identitas dirinya yang membedakannya dengan yang lain. Liverpool Garis Keras memiliki gaya komunikasi khas yang
Islami, Muhammad Baihaqi 51603050036
core
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak [PDF]
Conditional cube attack was proposed by Huang et al. at EUROCRYPT 2017 to attack Keccak keyed mode. Inspired by dynamic cube attack, they reduce the degree by appending key bit conditions on the initial value (IV). Recently, Li et al.
Haibo Zhou +4 more
core
Optimizing S-box Implementations Using SAT Solvers: Revisited [PDF]
We propose a new method to encode the problems of optimizing S-box implementations into SAT problems. By considering the inputs and outputs of gates as Boolean functions, the fundamental idea of our method is representing the relationships between these ...
Fuxin Zhang, Zhenyu Huang
core
Generic Attack on Duplex-Based AEAD Modes using Random Function Statistics [PDF]
Duplex-based authenticated encryption modes with a sufficiently large key length are proven to be secure up to the birthday bound 2^(c/2), where c is the capacity.
Henri Gilbert +3 more
core
ANALISIS PERILAKU KONSUMEN DIEVHA CAFÉ DI KECAMATAN SUMBER JAYA KABUPATEN LAMPUNG BARAT [PDF]
This research aims to analyze decision making, attitude, satisfaction and customer loyalty of Dievha Café in Sumber Jaya District, West Lampung Regency.
Adawiyah, Rabiatul +2 more
core +1 more source
Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes [PDF]
Frit is a new lightweight 384-bit cryptographic permutation proposed by Simon et al., which is designed for resisting fault injection and performs competitively in both hardware and software. Dobraunig et al.
Keting Jia +3 more
core
Performance and Limitation Review of Secure Hash Function Algorithm [PDF]
A cryptographic hash work is a phenomenal class of hash work that has certain properties which make it fitting for use in cryptography. It is a numerical figuring that maps information of emotional size to a bit string of a settled size (a hash) and is ...
Chetty, Tejasvini, Malviya, Iti
core +2 more sources

