Results 41 to 50 of about 169 (90)

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion [PDF]

open access: yes, 2019
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights.
Christoph Dobraunig   +5 more
core   +3 more sources

Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY [PDF]

open access: yes
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack.
Deng Tang, Haoyang Wang, Jianing Zhang
core  

A Holistic Framework for Impossible Boomerang Attacks [PDF]

open access: yes
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques.
Jiahao Zhao   +5 more
core  

Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256 [PDF]

open access: yes, 2018
Deoxys-BC is the internal tweakable block cipher of Deoxys, a third-round authenticated encryption candidate at the CAESAR competition. In this study, by adequately studying the tweakey schedule, we seek a six-round related-tweakey impossible ...
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
core  

Chosen-Key Distinguishing Attacks on Full AES-192, AES-256, Kiasu-BC, and More [PDF]

open access: yes, 2023
At CRYPTO 2020, Liu et al. find that many differentials on Gimli are actually incompatible. On the related-key differential of AES, the incompatibilities also exist and are handled in different ad-hoc ways by adding respective constraints into the ...
Phuong Pham, Shun Li, Xiaoyang Dong
core  

Boomerang Connectivity Table Revisited. Application to SKINNY and AES [PDF]

open access: yes, 2019
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as the composition of two sub-ciphers, i.e., E = E1 o E0, and which constructs distinguishers for E with probability p2q2 by combining differential trails for ...
Lei Hu, Ling Song, Xianrui Qin
core   +2 more sources

Truncated Boomerang Attacks and Application to AES-based Ciphers [PDF]

open access: yes, 2023
The boomerang attack is a cryptanalysis technique that combines two short differentials instead of using a single long differential. It has been applied to many primitives, and results in the best known attacks against several AES-based ciphers (Kiasu-BC,
Augustin Bariant, Gaƫtan Leurent
core  

Key-Recovery Attacks on CRAFT and WARP (Full Version) [PDF]

open access: yes, 2022
This paper considers the security of CRAFT and WARP. We present a practical key-recovery attack on full-round CRAFT in the related-key setting with only one differential characteristic, and the theoretical time complexity of the attack is $2^{36.09 ...
Ling Sun, Meiqin Wang, Wei Wang
core  

Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages [PDF]

open access: yes, 2019
This is an extended version of the article with the same title accepted at Asiacrypt 2019.International audienceHighly efficient encryption and authentication of short messages is an essential requirement for enabling security in constrained scenarios ...
C Beierle   +30 more
core   +4 more sources

Home - About - Disclaimer - Privacy