Results 151 to 160 of about 15,909 (208)

Tortoise: An Authenticated Encryption Scheme

open access: yes
Given the open nature of the Internet, there is a need for authentication schemes to address inherent trust issues. We present Tortoise, an experimental nonce-based authenticated encryption scheme modeled on the Synthetic Counter-in-Tweak.
Odoh, Kenneth
core  

Beyond-Birthday-Bound Security Based on Tweakable Block Cipher

open access: yesFast Software Encryption Workshop, 2009
Kazuhiko Minematsu
semanticscholar   +1 more source

HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach [PDF]

open access: yes, 2006
D. Chakraborty   +7 more
core   +1 more source

Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC

open access: yesThe Computer Journal, 2021
Deoxys-BC is an internal tweakable block cipher of the authenticated encryption algorithm Deoxys, which is a third-round finalist in the CAESAR competition.
Manman Li, Shaozhen Chen
semanticscholar   +2 more sources

A upper bound of the tweak length in tweakable block cipher

Fourth International Conference on High Performance Computing and Communication Engineering (HPCCE 2024)
In this paper, We analyze the upper bound of the tweak length in a specific Tweakable Block Cipher(TBC), which has been proven to achieve 𝟐𝒏 security. The upper bound of the tweak length is determined by the number of times it is utilized in two distinct
Yitian Wang, Yuan Feng
semanticscholar   +2 more sources

Meet-in-the-middle attacks on round-reduced tweakable block cipher Deoxys-BC

open access: yesIET Information Security, 2019
Deoxys-BC is a tweakable block cipher designed by Jean et al. at ASIACRYPT 2014 within the TWEAKEY framework. Then Deoxys-BC is used in the CAESAR finalist Deoxys.
Rongjia Li, Chenhui Jin
semanticscholar   +2 more sources

Home - About - Disclaimer - Privacy