Results 21 to 30 of about 738 (105)
Rotational-XOR Differential Rectangle Cryptanalysis on Simon-like Ciphers [PDF]
In this paper, we propose a rectangle-like method called \textit{rotational-XOR differential rectangle} attack to search for better distinguishers. It is a combination of the rotational-XOR cryptanalysis and differential cryptanalysis in the rectangle ...
Mingming Zhu +5 more
core +2 more sources
Commutative Cryptanalysis Made Practical
About 20 years ago, Wagner showed that most of the (then) known techniques used in the cryptanalysis of block ciphers were particular cases of what he called commutative diagram cryptanalysis.
Jules Baudrin +5 more
doaj +1 more source
On Boomerang Attacks on Quadratic Feistel Ciphers
The recent introduction of the Boomerang Connectivity Table (BCT) at Eurocrypt 2018 revived interest in boomerang cryptanalysis and in the need to correctly build boomerang distinguishers.
Xavier Bonnetain, Virginie Lallemand
doaj +1 more source
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis
The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for constrained devices.
Johannes Erlacher +2 more
doaj +1 more source
Rotational-XOR Rectangle Cryptanalysis on Round-Reduced Simon [PDF]
Recently, Ashur and Liu introduced the Rotational-XOR-difference approach which is a modification of rotational cryptanalysis, for an ARX cipher Speck (Ashur and Liu, 2016). In this paper, we apply the Rotational-XOR-difference (RXD) approach to a non-ARX cipher Simon and evaluate its security.
Bonwook Koo +2 more
openaire +1 more source
ROTATIONAL CRYPTANALYSIS OF GOST WITH IDENTICAL S-BOXES [PDF]
ABSTRACT Rotational cryptanalysis was introduced by Khovratovich and Nikoli ´c as a tool to analyse ARX-type cipher designs. GOST 28147-89 is a former Soviet Union cipher standard based on a Feistel construction with 32 rounds. Each round function adds the round key modulo 232, transforms the result with 4-to-4 bit S-boxes, and rotates the output.
Zajac, Pavol, Ondroš, Michal
openaire +2 more sources
A Survey of ARX-based Symmetric-key Primitives [PDF]
Addition Rotation XOR is suitable for fast implementation symmetric –key primitives, such as stream and block ciphers. This paper presents a review of several block and stream ciphers based on ARX construction followed by the discussion on the security ...
Abdul Latip, Shekh Faisal +2 more
core +2 more sources
MergeMAC:A MAC for Authentication with Strict Time Constraints and Limited Bandwidth [PDF]
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time requirements and extremely limited bandwidth. MergeMAC computes the MAC by splitting the message into two parts.
Ankele, Ralph +2 more
core +2 more sources
Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK [PDF]
Under embargo until: 2022-07-08Searching for the right pairs of inputs in difference-based distinguishers is an important task for the experimental verification of the distinguishers in symmetric-key ciphers.
Bagheri, Nasour +2 more
core +3 more sources
Electromagnetic glitch on the AES round counter [PDF]
International audienceThis article presents a Round Addition Analysis on a software implementation of the Advanced Encryption Standard (AES) algorithm. The round keys are computed on-the-fly during each encryption.
Dehbaoui, Amine +4 more
core +2 more sources

