Results 31 to 40 of about 1,484 (155)
Improved Rectangle Attacks on SKINNY and CRAFT
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher E as a composition of two sub-ciphers, i.e., E = E1 ∘ E0, to construct a distinguisher for E with probability p2q2 by concatenating two short ...
Hosein Hadipour +2 more
doaj +1 more source
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA [PDF]
The cryptographic hash functions BLAKE and Skein are built from the ChaCha stream cipher and the tweakable Threefish block cipher, respectively. Interestingly enough, they are based on the same arithmetic operations, and the same design philosophy allows
At Nuray +5 more
core +1 more source
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the underlying block cipher are referred to as AES hashing modes.
Zhenzhen Bao +4 more
doaj +1 more source
Efficient and Provable White-Box Primitives [PDF]
International audienceIn recent years there have been several attempts to build white-box block ciphers whose implementations aim to be incompress-ible.
A Biryukov +27 more
core +5 more sources
Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium [PDF]
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic attack applicable to cryptographic functions having a low-degree algebraic normal form over GF(2).
A. Maximov +16 more
core +2 more sources
Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme [PDF]
\textsf{HCTR}, proposed by Wang et al., is one of the most efficient candidates of tweakable enciphering schemes that turns an $n$-bit block cipher into a variable input length tweakable block cipher. Wang et al.
Bart Mennink +27 more
core +1 more source
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers
This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insights in the areas of key schedule design and tweakable block ciphers. We examine in a step by step manner the linear hull theorem in a general and consistent setting.
Kranz, Thorsten +2 more
openaire +3 more sources
09031 Abstracts Collection -- Symmetric Cryptography [PDF]
From 11.01.09 to 16.01.09, the Seminar 09031 in ``Symmetric Cryptography \u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open ...
Handschuh, Helena +3 more
core +1 more source
HCTR+: An Optimally Secure TBC-Based Accordion Mode
The design of tweakable wide-block ciphers has advanced significantly over the past two decades. This evolution began with the wide-block cipher by Naor and Reingold.
Nilanjan Datta +4 more
doaj +1 more source
Clustering Related-Tweak Characteristics: Application to MANTIS-6
The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule. Several recent attacks have analyzed the implications of this approach for differential cryptanalysis and ...
Maria Eichlseder, Daniel Kales
doaj +1 more source

