Results 111 to 120 of about 1,484 (155)
HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach [PDF]
D. Chakraborty +7 more
core +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2019Tweakable block cipher (TBC) is an extension of conventional block cipher. We study how to build a TBC based on generalized Feistel structure (GFS), a classical block cipher construction. While known dedicated TBC proposals are based on substitution-permutation network (SPN), GFS has not been used for building TBC.
Kosei SAKAMOTO +8 more
openaire +1 more source
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
2021Tweakable block cipher (TBC), a stronger notion than standard block ciphers, has wide-scale applications in symmetric-key schemes. At a high level, it provides flexibility in design and (possibly) better security bounds. In multi-keyed applications, a TBC with short tweak values can be used to replace multiple keys.
Chakraborti, Avik +5 more
openaire +1 more source
Arguments for Tweakable Block Cipher-Based Cryptography
2021As discussed in Sect. 1.3, a TBC is a variant of a BC that accepts a public tweak to change its behavior. TBC-based AEAD designs have a lot of nice performance and security features that we will discuss in this chapter. First, we give an early history of TBC designs in Sect. 4.1. Then, we discuss the impact of the TWEAKEY framework in Sect. 4.2.
openaire +1 more source
Romulus: Lighweight AEAD from Tweakable Block Ciphers
2021In this chapter, we present the NIST lightweight finalist, Romulus. It is a family of lightweight, very efficient, and highly-secure algorithms; including, but not restricted to, NAE (Romulus-N) and MRAE (Romulus-M) schemes.
openaire +1 more source
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
2020Inserting backdoors in encryption algorithms has long seemed like a very interesting, yet difficult problem. Most attempts have been unsuccessful for symmetric-key primitives so far and it remains an open problem how to build such ciphers.
Thomas Peyrin, Haoyang Wang
openaire +1 more source
Compactly Committing Authenticated Encryption Using Tweakable Block Cipher
2020Message franking is a cryptographic scheme introduced in the Facebook end-to-end encrypted messaging system. It enables users to report abusive messages to Facebook in a verifiable manner. Grubbs, Lu and Ristenpart initiated theoretical study of message franking.
openaire +1 more source
AN EFFICIENT FPGA HARDWARE IMPLEMENTATION OF THE THREEFISH TWEAKABLE BLOCK CIPHER
International Journal of Modelling and Simulation, 2012An Efficient Fpga Hardware Implementation of The Threefish Tweakable Block Cipher، للحصول على النص الكامل يرجى زيارة مكتبة الحسين بن طلال في جامعة اليرموك او زيارة موقعها ...
Hussein R. Al-Zoubi +2 more
openaire +1 more source
2019
Tweakable block ciphers are important primitives for designing cryptographic schemes with high security. In the absence of a standardized tweakable block cipher, constructions built from classical block ciphers remain an interesting research topic in both theory and practice. Motivated by Mennink’s \(\widetilde{F}[2]\) publication from 2015, Wang et al.
Ashwin Jha +4 more
openaire +1 more source
Tweakable block ciphers are important primitives for designing cryptographic schemes with high security. In the absence of a standardized tweakable block cipher, constructions built from classical block ciphers remain an interesting research topic in both theory and practice. Motivated by Mennink’s \(\widetilde{F}[2]\) publication from 2015, Wang et al.
Ashwin Jha +4 more
openaire +1 more source

