Results 61 to 70 of about 169 (90)

A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers [PDF]

open access: yes
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) schemes based on a tweakable block cipher (TBC). The starting point of our work is an analysis of the mu security of the SCT-II mode which underlies the ...
Benoît Cogliati   +3 more
core   +1 more source

Improved (Related-key) Differential Cryptanalysis on GIFT [PDF]

open access: yes, 2020
In this paper, we reevaluate the security of GIFT against differential cryptanalysis under both single-key scenario and related-key scenario. Firstly, we apply Matsui\u27s algorithm to search related-key differential trails of GIFT.
Chunning Zhou   +3 more
core  

A Note on the use of the Double Boomerang Connectivity Table (DBCT) for Spotting Impossibilities [PDF]

open access: yes
In this short note we examine one of the impossible boomerang distinguishers of Skinny-128-384 provided by Zhang, Wang and Tang at ToSC 2024 Issue 2 and disprove it.
Virginie Lallemand, Xavier Bonnetain
core  

A Practical Forgery Attack on Lilliput-AE [PDF]

open access: yes, 2019
Lilliput-AE is a tweakable block cipher submitted as a candidate to the NIST lightweight cryptography standardization process. It is based upon the lightweight block cipher Lilliput, whose cryptanalysis so far suggests that it has a large security margin.
Eran Lambooij   +3 more
core  

Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT [PDF]

open access: yes
In 1994, Langford and Hellman introduced differential-linear (DL) cryptanalysis, with the idea of decomposing the block cipher E into two parts, EU and EL, such that EU exhibits a high-probability differential trail, while EL has a high-correlation ...
Hosein Hadipour   +2 more
core  

Boomerang Connectivity Table Revisited [PDF]

open access: yes, 2019
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher $E$ as the composition of two sub-ciphers, i.e., $E=E_1\circ E_0$, and which constructs distinguishers for $E$ with probability $p^2q^2$ by combining ...
Lei Hu, Ling Song, Xianrui Qin
core  

Related-Key Differential and Boomerang Cryptanalysis in the Fixed-Key Model [PDF]

open access: yes
Differential cryptanalysis, along with its variants such as boomerang attacks, is widely used to evaluate the security of block ciphers. These cryptanalytic techniques often rely on assumptions like the \textit{hypothesis of stochastic equivalence} and ...
Chengcheng Chang   +3 more
core  

Home - About - Disclaimer - Privacy