Results 51 to 60 of about 169 (90)
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework [PDF]
We propose the TWEAKEY framework with goal to unify the design of tweakable block ciphers and of block ciphers resistant to related-key attacks. Our framework is simple, extends the key-alternating construction, and allows to build a primitive with ...
Ivica Nikolić +2 more
core
Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis [PDF]
Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single differential characteristics. However, already at EUROCRYPT'91, Lai et al.
A Biryukov +43 more
core +2 more sources
Analyse et Conception d'Algorithmes de Chiffrement Légers [PDF]
The work presented in this thesis has been completed as part of the FUI Paclido project, whose aim is to provide new security protocols and algorithms for the Internet of Things, and more specifically wireless sensor networks.
Huynh, Paul
core
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery [PDF]
The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as efficiently as possible.
Danping Shi +6 more
core
Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY [PDF]
Impossible differential cryptanalysis is a crucial cryptanalytical method for symmetric ciphers. Given an impossible differential, the key recovery attack typically proceeds in two steps: generating pairs of data and then identifying wrong keys using the
Lei Hu +4 more
core
SKINNY-Based RFID Lightweight Authentication Protocol. [PDF]
Xiao L, Xu H, Zhu F, Wang R, Li P.
europepmc +1 more source
Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool [PDF]
Impossible differential (ID) cryptanalysis and impossible boomerang (IB) cryptanalysis are two methods of impossible cryptanalysis against block ciphers. Since the seminal work introduced by Boura et al.
Haoyang Wang, Jianing Zhang
core
Impossible Differential Cryptanalysis on Deoxys-BC-256 [PDF]
Deoxys is a third-round candidate of the CAESAR competition. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal tweakable block cipher.
Alireza mehrdad +2 more
core
Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs [PDF]
A message authentication code (MAC) is a symmetric-key cryptographic function used to authenticate a message by assigning it a tag. This tag is a short string that is difficult to reproduce without knowing the key.
Amit Singh Bhati +3 more
core
Improved Rectangle Attacks on SKINNY and CRAFT [PDF]
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher $E$ as a composition of two sub-ciphers, i.e., $E = E_{1}\circ E_{0}$, to construct a distinguisher for $E$ with probability $p^{2}q^{2}$ by ...
Hosein Hadipour +2 more
core

