Results 161 to 170 of about 15,909 (208)
Some of the next articles are maybe not open access.

Arguments for Tweakable Block Cipher-Based Cryptography

Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers, 2021
As discussed in Sect. 1.3, a TBC is a variant of a BC that accepts a public tweak to change its behavior. TBC-based AEAD designs have a lot of nice performance and security features that we will discuss in this chapter. First, we give an early history of TBC designs in Sect. 4.1. Then, we discuss the impact of the TWEAKEY framework in Sect. 4.2.
Mustafa Khairallah
semanticscholar   +2 more sources

Compactly Committing Authenticated Encryption Using Tweakable Block Cipher

International Conference on Network and System Security, 2020
Message franking is a cryptographic scheme introduced in the Facebook end-to-end encrypted messaging system. It enables users to report abusive messages to Facebook in a verifiable manner. Grubbs, Lu and Ristenpart initiated theoretical study of message franking.
Shoichi Hirose
semanticscholar   +2 more sources

Collision-Resistant and Pseudorandom Hash Function Using Tweakable Block Cipher

Web Information System and Application Conference, 2022
Shoichi Hirose
semanticscholar   +2 more sources

Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher

IACR Cryptology ePrint Archive, 2019
Tweakable block cipher (TBC), a stronger notion than standard block ciphers, has wide-scale applications in symmetric-key schemes. At a high level, it provides flexibility in design and (possibly) better security bounds. In multi-keyed applications, a TBC with short tweak values can be used to replace multiple keys.
Avik Chakraborti   +5 more
semanticscholar   +2 more sources

Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2019
Tweakable block cipher (TBC) is an extension of conventional block cipher. We study how to build a TBC based on generalized Feistel structure (GFS), a classical block cipher construction. While known dedicated TBC proposals are based on substitution-permutation network (SPN), GFS has not been used for building TBC.
Kosei Sakamoto   +8 more
semanticscholar   +2 more sources

A Summary of the Security of Tweakable Block Ciphers Against Simon's Quantum Algorithm

2025 10th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA)
Tweakable block ciphers are more flexible than traditional block ciphers and widely used in modes of operation such as MAC and authenticated encryption.
Jianfeng Ruan   +3 more
semanticscholar   +2 more sources

Length-Preserving Encryption Based on Single-Key Tweakable Block Cipher

Provable Security, 2018
We present a Single-key Length Doubler built on an n-bit Tweakable block cipher (SLDT), which is a length-preserving cipher on the strings with bit length in integer interval \(\left[ n, n+1, \ldots , 2n-1\right] \). SLDT is mainly motivated to reduce the key material size of a length doubler proposed by Chen et al. at FSE2018, since the key management
Xiangyang Zhang   +6 more
semanticscholar   +2 more sources

Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers [PDF]

open access: yesAnnual International Cryptology Conference, 2016
We propose the Synthetic Counter-in-Tweak $$\mathsf {SCT}$$ mode, which turns a tweakable block cipher into a nonce-based authenticated encryption scheme with associated data. The $$\mathsf {SCT}$$ mode combines in a SIV-like manner a Wegman-Carter MAC inspired from $$\mathsf {PMAC}$$ for the authentication part and a new counter-like mode for the ...
Thomas Peyrin, Y. Seurin
semanticscholar   +2 more sources

ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication

Annual International Cryptology Conference, 2017
We propose a new mode of operation called \(\mathsf {ZMAC}\) allowing to construct a (stateless and deterministic) message authentication code (MAC) from a tweakable block cipher (TBC). When using a TBC with n-bit blocks and t-bit tweaks, our construction provides security (as a variable-input-length PRF) beyond the birthday bound with respect to the ...
Tetsu Iwata   +3 more
semanticscholar   +2 more sources

Home - About - Disclaimer - Privacy