Results 31 to 40 of about 15,909 (208)

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Boomerang Connectivity Table:A New Cryptanalysis Tool [PDF]

open access: yes, 2018
A boomerang attack is a cryptanalysis framework that regards a block cipher $E$ as the composition of two sub-ciphers $E_1\circ E_0$ and builds a particular characteristic for $E$ with probability $p^2q^2$ by combining differential characteristics for ...
A Biryukov   +21 more
core   +2 more sources

Forking Tweakable Even-Mansour Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2020
A forkcipher is a keyed, tweakable function mapping an n-bit input to a 2nbit output, which is equivalent to concatenating two outputs from two permutations.
Hwigyeom Kim   +2 more
doaj   +3 more sources

Improved Rectangle Attacks on SKINNY and CRAFT

open access: yesIACR Transactions on Symmetric Cryptology, 2021
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher E as a composition of two sub-ciphers, i.e., E = E1 ∘ E0, to construct a distinguisher for E with probability p2q2 by concatenating two short ...
Hosein Hadipour   +2 more
doaj   +1 more source

Related-Key Impossible-Differential Attack on Reduced-Round Skinny [PDF]

open access: yes, 2017
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK.
Ankele, Ralph   +6 more
core   +2 more sources

Re-Keying Scheme Revisited: Security Model and Instantiations

open access: yesApplied Sciences, 2019
The re-keying scheme is a variant of the symmetric encryption scheme where a sender (respectively, receiver) encrypts (respectively, decrypts) plaintext with a temporal session key derived from a master secret key and publicly-shared randomness.
Yuichi Komano, Shoichi Hirose
doaj   +1 more source

Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the underlying block cipher are referred to as AES hashing modes.
Zhenzhen Bao   +4 more
doaj   +1 more source

Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA [PDF]

open access: yes, 2014
The cryptographic hash functions BLAKE and Skein are built from the ChaCha stream cipher and the tweakable Threefish block cipher, respectively. Interestingly enough, they are based on the same arithmetic operations, and the same design philosophy allows
At Nuray   +5 more
core   +1 more source

Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme [PDF]

open access: yes, 2019
\textsf{HCTR}, proposed by Wang et al., is one of the most efficient candidates of tweakable enciphering schemes that turns an $n$-bit block cipher into a variable input length tweakable block cipher. Wang et al.
Bart Mennink   +27 more
core   +1 more source

Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium [PDF]

open access: yes, 2009
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic attack applicable to cryptographic functions having a low-degree algebraic normal form over GF(2).
A. Maximov   +16 more
core   +2 more sources

Home - About - Disclaimer - Privacy