Results 11 to 20 of about 389,362 (239)
Weak-keys and key-recovery attack for $$\text{ TinyJAMBU }$$ TinyJAMBU [PDF]
In this paper, we study NIST lightweight 3rd round candidate $$\text{ TinyJAMBU }$$ TinyJAMBU . The core component of $$\text{ TinyJAMBU }$$ TinyJAMBU is the keyed permutation $$\mathcal {P}_n$$ P n , which is based on a non-linear feedback shift ...
Pranjal Dutta +2 more
doaj +2 more sources
A practical key recovery attack on the lightweight WG-5 stream cipher [PDF]
WG-5 is a lightweight stream cipher proposed for usage in the resource-constrained devices, e.g., passive RFID tags, industrial controllers, contactless smart cards and sensors.
Lin Ding +5 more
doaj +2 more sources
A Key-Recovery Attack on SOBER-128 [PDF]
In this talk we consider linear approximations of layered cipher constructions with secret key-dependent constants that are inserted between layers, and where the layers have strong interdependency.
Hakala, Risto, Nyberg, Kaisa
core +1 more source
Generic attacks on small-state stream cipher constructions in the multi-user setting
Small-state stream ciphers (SSCs), which violate the principle that the state size should exceed the key size by a factor of two, still demonstrate robust security properties while maintaining a lightweight design.
Jianfu Huang +5 more
doaj +1 more source
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
Cryptanalysis of Rocca and Feasibility of Its Security Claim
Rocca is an authenticated encryption with associated data scheme for beyond 5G/6G systems. It was proposed at FSE 2022/ToSC 2021(2), and the designers make a security claim of achieving 256-bit security against key-recovery and distinguishing attacks ...
Akinori Hosoyamada +6 more
doaj +1 more source
A practical attack on the fixed RC4 in the wep mode [PDF]
. In this paper we revisit a known but ignored weakness of the RC4 keystream generator, where secret state info leaks to the generated keystream, and show that this leakage, also known as Jenkins’ correlation or the RC4 glimpse, can be used to attack RC4
A. Maximov +14 more
core +1 more source
Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse Setting
Ascon family is one of the finalists of the National Institute of Standards and Technology (NIST) lightweight cryptography standardization process. The family includes three Authenticated Encryption with Associated Data (AEAD) schemes: Ascon-128 (primary)
Donghoon Chang +3 more
doaj +1 more source
. Sprout is a lightweight stream cipher proposed by Armknecht and Mikhalev at FSE 2015. It has a Grain-like structure with two State Registers of size 40 bits each, which is exactly half the state size of Grain v1.
A Biryukov +4 more
core +2 more sources
Fault Template Attack Based on Fault Probability
Template attack uses leaked information from various side channels and may break out the countermeasures embedded in the algorithm, which is considered a powerful side-channel attack method.
Tong Wu, Dawei Zhou, Lei Du, Shiwei Wang
doaj +1 more source

