Results 21 to 30 of about 1,484 (155)

Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms

open access: yesIACR Transactions on Symmetric Cryptology, 2020
In this article, we propose two new families of very lightweight and efficient authenticated encryption with associated data (AEAD) modes, Romulus and Remus, that provide security beyond the birthday bound with respect to the block-length n.
Tetsu Iwata   +3 more
doaj   +1 more source

Almost-Minimal-Round BBB-Secure Tweakable Key-Alternating Feistel Block Cipher [PDF]

open access: yesSymmetry, 2021
This paper focuses on designing a tweakable block cipher via by tweaking the Key-Alternating Feistel (KAF for short) construction. Very recently Yan et al. published a tweakable KAF construction. It provides a birthday-bound security with 4 rounds and Beyond-Birthday-Bound (BBB for short) security with 10 rounds. Following their work, we further reduce
Ming Jiang, Lei Wang
openaire   +1 more source

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Optimization of Tree Modes for Parallel Hash Functions: A Case Study [PDF]

open access: yes, 2017
This paper focuses on parallel hash functions based on tree modes of operation for an inner Variable-Input-Length function. This inner function can be either a single-block-length (SBL) and prefix-free MD hash function, or a sponge-based hash function ...
Atighehchi, Kevin, Rolland, Robert
core   +1 more source

Boomerang Connectivity Table:A New Cryptanalysis Tool [PDF]

open access: yes, 2018
A boomerang attack is a cryptanalysis framework that regards a block cipher $E$ as the composition of two sub-ciphers $E_1\circ E_0$ and builds a particular characteristic for $E$ with probability $p^2q^2$ by combining differential characteristics for ...
A Biryukov   +21 more
core   +2 more sources

Forking Tweakable Even-Mansour Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2020
A forkcipher is a keyed, tweakable function mapping an n-bit input to a 2nbit output, which is equivalent to concatenating two outputs from two permutations.
Hwigyeom Kim   +2 more
doaj   +3 more sources

Weak Tweak-Keys for the CRAFT Block Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2022
CRAFT is a lightweight tweakable Substitution-Permutation-Network (SPN) block cipher optimized for efficient protection of its implementations against Differential Fault Analysis (DFA) attacks.
Gregor Leander, Shahram Rasoolzadeh
doaj   +1 more source

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights. For instance, results of Kranz, Leander, and Wiemer from FSE 2017 show that the addition of a tweak using a linear tweak schedule does not introduce new linear characteristics.
Ankele, Ralph   +5 more
openaire   +6 more sources

Related-Key Impossible-Differential Attack on Reduced-Round Skinny [PDF]

open access: yes, 2017
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK.
Ankele, Ralph   +6 more
core   +2 more sources

Re-Keying Scheme Revisited: Security Model and Instantiations

open access: yesApplied Sciences, 2019
The re-keying scheme is a variant of the symmetric encryption scheme where a sender (respectively, receiver) encrypts (respectively, decrypts) plaintext with a temporal session key derived from a master secret key and publicly-shared randomness.
Yuichi Komano, Shoichi Hirose
doaj   +1 more source

Home - About - Disclaimer - Privacy