Results 51 to 60 of about 169 (90)

Tweaks and Keys for Block Ciphers: the TWEAKEY Framework [PDF]

open access: yes, 2015
We propose the TWEAKEY framework with goal to unify the design of tweakable block ciphers and of block ciphers resistant to related-key attacks. Our framework is simple, extends the key-alternating construction, and allows to build a primitive with ...
Ivica Nikolić   +2 more
core  

Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis [PDF]

open access: yes, 2018
Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single differential characteristics. However, already at EUROCRYPT'91, Lai et al.
A Biryukov   +43 more
core   +2 more sources

Analyse et Conception d'Algorithmes de Chiffrement Légers [PDF]

open access: yes, 2020
The work presented in this thesis has been completed as part of the FUI Paclido project, whose aim is to provide new security protocols and algorithms for the Internet of Things, and more specifically wireless sensor networks.
Huynh, Paul
core  

Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery [PDF]

open access: yes, 2022
The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as efficiently as possible.
Danping Shi   +6 more
core  

Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY [PDF]

open access: yes
Impossible differential cryptanalysis is a crucial cryptanalytical method for symmetric ciphers. Given an impossible differential, the key recovery attack typically proceeds in two steps: generating pairs of data and then identifying wrong keys using the
Lei Hu   +4 more
core  

SKINNY-Based RFID Lightweight Authentication Protocol. [PDF]

open access: yesSensors (Basel), 2020
Xiao L, Xu H, Zhu F, Wang R, Li P.
europepmc   +1 more source

Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool [PDF]

open access: yes
Impossible differential (ID) cryptanalysis and impossible boomerang (IB) cryptanalysis are two methods of impossible cryptanalysis against block ciphers. Since the seminal work introduced by Boura et al.
Haoyang Wang, Jianing Zhang
core  

Impossible Differential Cryptanalysis on Deoxys-BC-256 [PDF]

open access: yes, 2018
Deoxys is a third-round candidate of the CAESAR competition. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal tweakable block cipher.
Alireza mehrdad   +2 more
core  

Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs [PDF]

open access: yes
A message authentication code (MAC) is a symmetric-key cryptographic function used to authenticate a message by assigning it a tag. This tag is a short string that is difficult to reproduce without knowing the key.
Amit Singh Bhati   +3 more
core  

Improved Rectangle Attacks on SKINNY and CRAFT [PDF]

open access: yes
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher $E$ as a composition of two sub-ciphers, i.e., $E = E_{1}\circ E_{0}$, to construct a distinguisher for $E$ with probability $p^{2}q^{2}$ by ...
Hosein Hadipour   +2 more
core  

Home - About - Disclaimer - Privacy