Results 91 to 100 of about 1,484 (155)
Weak-keys and key-recovery attack for [Formula: see text]. [PDF]
Dutta P, Rajasree MS, Sarkar S.
europepmc +1 more source
Weak Tweak-Key Analysis of Blink via Superbox
This work presents the first third-party cryptanalysis of Blink, a recent tweakable block cipher built on the Three-Hash Framework with a long-key design.
Shiyao Chen, Jian Guo, Tianyu Zhang
doaj +1 more source
An earlier paper by the same author (IACR Eprint 2008/473) suggested combining a block cipher and a stream cipher to get a strong hybrid cipher. This paper proposes a specific cipher based on those ideas, using the HC-128 stream cipher and a tweakable ...
Sandy Harris
core
Optimally Secure TBC Based Accordion Mode [PDF]
The design of tweakable wide block ciphers has advanced significantly over the past two decades. This evolution began with the approach of designing a wide block cipher by Naor and Reingold.
Avijit Dutta +3 more
core
On hashing with tweakable ciphers [PDF]
Cryptographic hash functions are often built on block ciphers in order to reduce the security analysis of the hash to that of the cipher, and to minimize the hardware size. Well known hash constructs are used in international standards like MD5 and SHA-1.
Jean-Philippe Aumasson (7210217) +1 more
core
Notes on (failed) attempts to instantiate TLR3 [PDF]
In this short paper we share our experience on instantiating the width-extension construct TLR3, based on a variety of tweakable block cipher constructs.
Alexander Maximov
core
Type-2 Generalized Feistel Structures Based on Tweakable Block Ciphers, Reconsidered
Generalized Feistel structures (GFSs) generalize a Feistel structure to have more flexible input length. Among them, Zheng et al. originally introduced type-2 GFS (CRYPTO '89) from pseudorandom functions (PRFs). This can be naturally instantiated with tweakable block ciphers (TBCs), which was analyzed by Nakaya and Iwata (ToSC 2022/FSE 2023). For a
Kento Tsuji, Tetsu Iwata
openaire +1 more source
Notions and relations for RKA-secure permutation and function families [PDF]
The theory of designing block ciphers is mature, having seen signi¯cant progress since the early 1990s for over two decades, especially during the AES devel- opment e®ort.
Ermaliza Razali (7215188) +4 more
core
SKINNY-Based RFID Lightweight Authentication Protocol. [PDF]
Xiao L, Xu H, Zhu F, Wang R, Li P.
europepmc +1 more source
Disk Encryption: Scrutinizing IEEE Standard 1619XTS-AES [PDF]
Disk encryption has changed during the last decade from being a mechanism only used by corporate executives and government agencies for their top secret information, to become trivially feasible for everyone to utilize.
Alam, Adnan Vaseem
core

