Results 151 to 160 of about 15,909 (208)
Enhancing security in instant messaging systems with a hybrid SM2, SM3, and SM4 encryption framework. [PDF]
Lu HJ, Juanatas RA, Abisado MB.
europepmc +1 more source
Augmented sets of output differences and new distinguishers for SPN ciphers. [PDF]
Girme R, Rohit R, Sarkar S.
europepmc +1 more source
Tortoise: An Authenticated Encryption Scheme
Given the open nature of the Internet, there is a need for authentication schemes to address inherent trust issues. We present Tortoise, an experimental nonce-based authenticated encryption scheme modeled on the Synthetic Counter-in-Tweak.
Odoh, Kenneth
core
Beyond-Birthday-Bound Security Based on Tweakable Block Cipher
Kazuhiko Minematsu
semanticscholar +1 more source
HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach [PDF]
D. Chakraborty +7 more
core +1 more source
Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC
Deoxys-BC is an internal tweakable block cipher of the authenticated encryption algorithm Deoxys, which is a third-round finalist in the CAESAR competition.
Manman Li, Shaozhen Chen
semanticscholar +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A upper bound of the tweak length in tweakable block cipher
Fourth International Conference on High Performance Computing and Communication Engineering (HPCCE 2024)In this paper, We analyze the upper bound of the tweak length in a specific Tweakable Block Cipher(TBC), which has been proven to achieve 𝟐𝒏 security. The upper bound of the tweak length is determined by the number of times it is utilized in two distinct
Yitian Wang, Yuan Feng
semanticscholar +2 more sources
Meet-in-the-middle attacks on round-reduced tweakable block cipher Deoxys-BC
Deoxys-BC is a tweakable block cipher designed by Jean et al. at ASIACRYPT 2014 within the TWEAKEY framework. Then Deoxys-BC is used in the CAESAR finalist Deoxys.
Rongjia Li, Chenhui Jin
semanticscholar +2 more sources

