Results 11 to 13 of about 17 (13)

Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY [PDF]

open access: yes
Impossible differential cryptanalysis is a crucial cryptanalytical method for symmetric ciphers. Given an impossible differential, the key recovery attack typically proceeds in two steps: generating pairs of data and then identifying wrong keys using the
Lei Hu   +4 more
core  

BBB Secure Arbitrary Length Tweak TBC from n-bit Block Ciphers [PDF]

open access: yes
At FSE\u2715, Mennink introduced two tweakable block ciphers, $\widetilde{F}[1]$ and $\widetilde{F}[2]$, both utilizing an $n$-bit tweak. It was demonstrated that $\widetilde{F}[1]$ is secure for up to $2^{2n/3}$ queries, while $\widetilde{F}[2]$ is ...
Arghya Bhattacharjee   +4 more
core  
Some of the next articles are maybe not open access.

Related searches:

Home - About - Disclaimer - Privacy