Results 41 to 50 of about 1,484 (155)
Practical Key-Recovery Attack on MANTIS5
MANTIS is a lightweight tweakable block cipher published at CRYPTO 2016. In addition to the full 14-round version, MANTIS7, the designers also propose an aggressive 10-round version, MANTIS5.
Christoph Dobraunig +3 more
doaj +1 more source
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher
This paper defines Spook: a sponge-based authenticated encryption with associated data algorithm. It is primarily designed to provide security against side-channel attacks at a low energy cost. For this purpose, Spook is mixing a leakageresistant mode of
Davide Bellizia +14 more
doaj +1 more source
Mini-ciphers: a reliable testbed for cryptanalysis? [PDF]
This paper reports on higher-order square analysis of the AES cipher. We present experimental results of attack simulations on mini-AES versions with word sizes of 3, 4, 5, 6 and 7 bits and describe the propagation of higher-order Lambda-sets inside some
Nakahara, Jorge +1 more
core +1 more source
Context-Committing Authenticated Encryptions Using Tweakable Stream Cipher
Committing security of authenticated encryption schemes is an emerging area and an active field of research and is highly motivated by real-world scenarios.
Donghoon Chang, Munawar Hasan
doaj +1 more source
INT-RUP Secure Lightweight Parallel AE Modes
Owing to the growing demand for lightweight cryptographic solutions, NIST has initiated a standardization process for lightweight cryptographic algorithms.
Avik Chakraborti +5 more
doaj +1 more source
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression [PDF]
International audienceIn typical applications of homomorphic encryption, the first step consists for Alice to encrypt some plaintext m under Bob’s public key pk and to send the ciphertext c = HEpk(m) to some third-party evaluator Charlie.
Canteaut, Anne +6 more
core +6 more sources
Cryptanalysis of PMACx, PMAC2x, and SIVx
At CT-RSA 2017, List and Nandi proposed two variable input length pseudorandom functions (VI-PRFs) called PMACx and PMAC2x, and a deterministic authenticated encryption scheme called SIVx.
Kazuhiko Minematsu, Tetsu Iwata
doaj +1 more source
ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode
NIST has recently initiated a standardization project for efficient lightweight authenticated encryption schemes. SUNDAE, a candidate in this project, achieves optimal state size which results in low circuit overhead on top of the underlying block cipher.
Avik Chakraborti +5 more
doaj +1 more source
MMM: Authenticated Encryption with Minimum Secret State for Masking
We propose a new authenticated encryption (AE) mode MMM that achieves the minimum memory size with masking. Minimizing the secret state is the crucial challenge in the low-memory AE suitable for masking.
Yusuke Naito +2 more
doaj +1 more source
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers [PDF]
We propose the Synthetic Counter-in-Tweak $$\mathsf {SCT}$$ mode, which turns a tweakable block cipher into a nonce-based authenticated encryption scheme with associated data. The $$\mathsf {SCT}$$ mode combines in a SIV-like manner a Wegman-Carter MAC inspired from $$\mathsf {PMAC}$$ for the authentication part and a new counter-like mode for the ...
Thomas Peyrin, Yannick Seurin
openaire +1 more source

