Results 91 to 100 of about 1,484 (155)

Weak-keys and key-recovery attack for [Formula: see text]. [PDF]

open access: yesSci Rep, 2022
Dutta P, Rajasree MS, Sarkar S.
europepmc   +1 more source

Weak Tweak-Key Analysis of Blink via Superbox

open access: yesIACR Transactions on Symmetric Cryptology
This work presents the first third-party cryptanalysis of Blink, a recent tweakable block cipher built on the Three-Hash Framework with a long-key design.
Shiyao Chen, Jian Guo, Tianyu Zhang
doaj   +1 more source

The Eris hybrid cipher [PDF]

open access: yes, 2010
An earlier paper by the same author (IACR Eprint 2008/473) suggested combining a block cipher and a stream cipher to get a strong hybrid cipher. This paper proposes a specific cipher based on those ideas, using the HC-128 stream cipher and a tweakable ...
Sandy Harris
core  

Optimally Secure TBC Based Accordion Mode [PDF]

open access: yes
The design of tweakable wide block ciphers has advanced significantly over the past two decades. This evolution began with the approach of designing a wide block cipher by Naor and Reingold.
Avijit Dutta   +3 more
core  

On hashing with tweakable ciphers [PDF]

open access: yes, 2009
Cryptographic hash functions are often built on block ciphers in order to reduce the security analysis of the hash to that of the cipher, and to minimize the hardware size. Well known hash constructs are used in international standards like MD5 and SHA-1.
Jean-Philippe Aumasson (7210217)   +1 more
core  

Notes on (failed) attempts to instantiate TLR3 [PDF]

open access: yes
In this short paper we share our experience on instantiating the width-extension construct TLR3, based on a variety of tweakable block cipher constructs.
Alexander Maximov
core  

Type-2 Generalized Feistel Structures Based on Tweakable Block Ciphers, Reconsidered

open access: yesIACR Communications in Cryptology
Generalized Feistel structures (GFSs) generalize a Feistel structure to have more flexible input length. Among them, Zheng et al. originally introduced type-2 GFS (CRYPTO '89) from pseudorandom functions (PRFs). This can be naturally instantiated with tweakable block ciphers (TBCs), which was analyzed by Nakaya and Iwata (ToSC 2022/FSE 2023). For a
Kento Tsuji, Tetsu Iwata
openaire   +1 more source

Notions and relations for RKA-secure permutation and function families [PDF]

open access: yes, 2011
The theory of designing block ciphers is mature, having seen signi¯cant progress since the early 1990s for over two decades, especially during the AES devel- opment e®ort.
Ermaliza Razali (7215188)   +4 more
core  

SKINNY-Based RFID Lightweight Authentication Protocol. [PDF]

open access: yesSensors (Basel), 2020
Xiao L, Xu H, Zhu F, Wang R, Li P.
europepmc   +1 more source

Disk Encryption: Scrutinizing IEEE Standard 1619XTS-AES [PDF]

open access: yes, 2009
Disk encryption has changed during the last decade from being a mechanism only used by corporate executives and government agencies for their top secret information, to become trivially feasible for everyone to utilize.
Alam, Adnan Vaseem
core  

Home - About - Disclaimer - Privacy