Results 171 to 180 of about 15,909 (208)
Some of the next articles are maybe not open access.
ASURA: An Efficient Large-State Tweakable Block Cipher for ARM Environment
International Conference on Cryptology in IndiaAtsushi Tanaka +5 more
semanticscholar +2 more sources
Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher
Provable Security, 2015We propose a new message authentication code MAC based on a tweakable block cipher TBC. We prove that the new MAC is a pseudo-random function PRF upi¾?to $$O2^n$$ queries, that is, full PRF-security, where the output length of the TBC is n bits. We note that although Yasuda proposed a full PRF-secure MAC based on a compression function CF, that does ...
Yusuke Naito
semanticscholar +2 more sources
Tweakable Block Mode of Operation for Disk Encompression Using Cipher Text Stealing
, 2020In this paper, we study a particular class of symmetric algorithms that aim to ensure confidentiality by using a functionality that is tweakable enciphering scheme. A tweakable enciphering scheme is a length preserving encryption protocol which can encrypt messages of varying lengths.
Rashmita Padhi, B. Ray
semanticscholar +2 more sources
An Efficient FPGA Hardware Implementation of the Threefish Tweakable Block Cipher
International Journal of Modelling and Simulation, 2012An Efficient Fpga Hardware Implementation of The Threefish Tweakable Block Cipher، للحصول على النص الكامل يرجى زيارة مكتبة الحسين بن طلال في جامعة اليرموك او زيارة موقعها ...
Hussein R. Al-Zoubi +2 more
semanticscholar +2 more sources
Romulus: Lighweight AEAD from Tweakable Block Ciphers
2021In this chapter, we present the NIST lightweight finalist, Romulus. It is a family of lightweight, very efficient, and highly-secure algorithms; including, but not restricted to, NAE (Romulus-N) and MRAE (Romulus-M) schemes.
openaire +1 more source
The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers
2020Inserting backdoors in encryption algorithms has long seemed like a very interesting, yet difficult problem. Most attempts have been unsuccessful for symmetric-key primitives so far and it remains an open problem how to build such ciphers.
Thomas Peyrin, Haoyang Wang
openaire +1 more source
Post-Quantum Security of Block Cipher Constructions
arXiv.orgBlock ciphers are versatile cryptographic ingredients that are used in a wide range of applications ranging from secure Internet communications to disk encryption. While post-quantum security of public-key cryptography has received significant attention,
G. Alagic +3 more
semanticscholar +1 more source
2019
Tweakable block ciphers are important primitives for designing cryptographic schemes with high security. In the absence of a standardized tweakable block cipher, constructions built from classical block ciphers remain an interesting research topic in both theory and practice. Motivated by Mennink’s \(\widetilde{F}[2]\) publication from 2015, Wang et al.
Ashwin Jha +4 more
openaire +1 more source
Tweakable block ciphers are important primitives for designing cryptographic schemes with high security. In the absence of a standardized tweakable block cipher, constructions built from classical block ciphers remain an interesting research topic in both theory and practice. Motivated by Mennink’s \(\widetilde{F}[2]\) publication from 2015, Wang et al.
Ashwin Jha +4 more
openaire +1 more source
On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
Cryptography and Communications, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ashwin Jha, Mridul Nandi
openaire +2 more sources
Tweakable SM4: How to tweak SM4 into tweakable block ciphers?
Journal of Information Security and Applications, 2023Zhenzhen Guo +4 more
openaire +1 more source

