Chaghri:A FHE-friendly Block Cipher [PDF]
The Recent progress in practical applications of secure computation protocols has also attracted attention to the symmetric-key primitives underlying them.
Ashur, Tomer +2 more
core +1 more source
Security of a New Cryptographic Hash Function - Titanium [PDF]
This paper introduces the security analysis of Titanium hash function that uses SF block cipher and follows sponge construction. A brief description of the sponge function and the design choice of Titanium are introduced.
Al-Ahmad, Mohammad A. +1 more
core +3 more sources
Generation of highly nonlinear and dynamic AES substitution-boxes (S-boxes) using chaos-based rotational matrices [PDF]
This work reports a novel chaos-based affine transformation generation method, which is based on rotational matrices to design strong key-based S-boxes.
Ahmad, W. +13 more
core +1 more source
Some Algebraic Properties of RX-Differential Probabilities of Boolean Mappings
Introduction. ARX- and LRX- cryptosystems are based on extremely simple operations available at the level of computing processor instructions, such as modular addition, bitwise addition, rotations, etc.
Serhii Yakovliev
doaj +1 more source
Towards a combined Rotational-Differential Cryptanalytic Framework [PDF]
In this report, we suggest a new cryptanalytic framework of constructing distinguishers which can be eventually extended to full attacks in the related-key scenario. We name this new paradigm as ”Relational Cryptanalysis”. The main idea is to exhibit the
Christofi, M. +2 more
core
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels
We show that subtle acoustic noises emanating from within computer screens can be used to detect the content displayed on the screens. This sound can be picked up by ordinary microphones built into webcams or screens, and is inadvertently transmitted to ...
Genkin, Daniel +3 more
core +1 more source
HeW: AHash Function based on Lightweight Block Cipher FeW [PDF]
A new hash function HeW: A hash function based on light weight block cipher FeW is proposed in this paper. The compression function of HeW is based on block cipher FeW.
Dey, Dhananjoy +3 more
core +2 more sources
Differential Cryptanalysis with SAT, SMT, MILP, and CP: A Detailed Comparison for Bit-Oriented Primitives [PDF]
SAT, SMT, MILP, and CP, have become prominent in the differential cryptanalysis of cryptographic primitives. In this paper, we review the techniques for constructing differential characteristic search models in these four formalisms.
Alessandro De Piccoli +7 more
core +1 more source
Rotational analysis of ChaCha permutation [PDF]
We show that the underlying permutation of ChaCha20 stream cipher does not behave as a random permutation for up to 17 rounds with respect to rotational cryptanalysis.
Barbero, Stefano +2 more
core +1 more source
Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette [PDF]
The differential-linear attack, combining the power of the two most effective techniques for symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994.
Chao Li, Siwei Sun, Yunwen Liu
core

