Results 1 to 10 of about 15,909 (208)

Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2023
We consider the design of a tweakable block cipher from a block cipher whose inputs and outputs are of size n bits. The main goal is to achieve 2n security with a large tweak (i.e., more than n bits). Previously, Mennink at FSE’15 and Wang et al.
Yaobin Shen, François-Xavier Standaert
doaj   +7 more sources

The QARMAv2 Family of Tweakable Block Ciphers [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2023
We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA (from FSE 2017) to improve its security bounds and allow for longer tweaks, while keeping similar latency and area.
Roberto Avanzi   +6 more
doaj   +7 more sources

BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Recently, a memory safety concept called Cryptographic Capability Computing (C3) has been proposed. C3 is the first memory safety mechanism that works without requiring extra storage for metadata and hence, has the potential to significantly enhance the
Yanis Belkheyar   +4 more
doaj   +4 more sources

Provably Quantum-Secure Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Recent results on quantum cryptanalysis show that some symmetric key schemes can be broken in polynomial time even if they are proven to be secure in the classical setting.
Akinori Hosoyamada, Tetsu Iwata
doaj   +4 more sources

Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We consider a problem of constructing a secure block cipher from a tweakable block cipher (TBC) with long tweaks. Given a TBC with n-bit blocks and Γn-bit tweaks for Γ ≥ 1, one of the constructions by Minematsu in DCC 2015 shows that a simple iteration ...
Ryota Nakamichi, Tetsu Iwata
doaj   +4 more sources

CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2019
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryptanalytic security.
Christof Beierle   +3 more
doaj   +5 more sources

Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis [PDF]

open access: yesEntropy, 2023
Lightweight block ciphers are normally used in low-power resource-constrained environments, while providing reliable and sufficient security. Therefore, it is important to study the security and reliability of lightweight block ciphers.
Xing Fang   +4 more
doaj   +2 more sources

Weak Tweak-Keys for the CRAFT Block Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2022
CRAFT is a lightweight tweakable Substitution-Permutation-Network (SPN) block cipher optimized for efficient protection of its implementations against Differential Fault Analysis (DFA) attacks.
Gregor Leander, Shahram Rasoolzadeh
doaj   +2 more sources

Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE [PDF]

open access: yesProgress in Cryptology - AFRICACRYPT 202012th International Conference on Cryptology in Africa, 2020
Tweakable TWINE (T-TWINE) is a new lightweight tweakable block cipher family proposed by Sakamoto $et$ $al$. at IWSEC 2019. T-TWINE is the first Tweakable Block Cipher (TBC) that is built on Generalized Feistel Structure (GFS).
Tolba M, ElSheikh M, Youssef A.
europepmc   +3 more sources

Impossible differential cryptanalysis of lightweight tweakable block cipher CRAFT

open access: yesCybersecurity
The CRAFT cipher is a lightweight tweakable block cipher introduced at FSE 2019. Its design aims to incorporate countermeasures against Differential Fault Attacks at the algorithmic level.
Fen Liu   +5 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy