Results 31 to 40 of about 1,484 (155)

Improved Rectangle Attacks on SKINNY and CRAFT

open access: yesIACR Transactions on Symmetric Cryptology, 2021
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher E as a composition of two sub-ciphers, i.e., E = E1 ∘ E0, to construct a distinguisher for E with probability p2q2 by concatenating two short ...
Hosein Hadipour   +2 more
doaj   +1 more source

Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA [PDF]

open access: yes, 2014
The cryptographic hash functions BLAKE and Skein are built from the ChaCha stream cipher and the tweakable Threefish block cipher, respectively. Interestingly enough, they are based on the same arithmetic operations, and the same design philosophy allows
At Nuray   +5 more
core   +1 more source

Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the underlying block cipher are referred to as AES hashing modes.
Zhenzhen Bao   +4 more
doaj   +1 more source

Efficient and Provable White-Box Primitives [PDF]

open access: yes, 2016
International audienceIn recent years there have been several attempts to build white-box block ciphers whose implementations aim to be incompress-ible.
A Biryukov   +27 more
core   +5 more sources

Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium [PDF]

open access: yes, 2009
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic attack applicable to cryptographic functions having a low-degree algebraic normal form over GF(2).
A. Maximov   +16 more
core   +2 more sources

Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme [PDF]

open access: yes, 2019
\textsf{HCTR}, proposed by Wang et al., is one of the most efficient candidates of tweakable enciphering schemes that turns an $n$-bit block cipher into a variable input length tweakable block cipher. Wang et al.
Bart Mennink   +27 more
core   +1 more source

Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insights in the areas of key schedule design and tweakable block ciphers. We examine in a step by step manner the linear hull theorem in a general and consistent setting.
Kranz, Thorsten   +2 more
openaire   +3 more sources

09031 Abstracts Collection -- Symmetric Cryptography [PDF]

open access: yes, 2009
From 11.01.09 to 16.01.09, the Seminar 09031 in ``Symmetric Cryptography \u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open ...
Handschuh, Helena   +3 more
core   +1 more source

HCTR+: An Optimally Secure TBC-Based Accordion Mode

open access: yesIACR Transactions on Symmetric Cryptology
The design of tweakable wide-block ciphers has advanced significantly over the past two decades. This evolution began with the wide-block cipher by Naor and Reingold.
Nilanjan Datta   +4 more
doaj   +1 more source

Clustering Related-Tweak Characteristics: Application to MANTIS-6

open access: yesIACR Transactions on Symmetric Cryptology, 2018
The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule. Several recent attacks have analyzed the implications of this approach for differential cryptanalysis and ...
Maria Eichlseder, Daniel Kales
doaj   +1 more source

Home - About - Disclaimer - Privacy