Results 51 to 60 of about 1,484 (155)
Extended Generalized Feistel Networks using Matrix Representation [PDF]
International audienceWhile Generalized Feistel Networks have been widely studied in the literature as a building block of a block cipher, we propose in this paper a unified vision to easily represent them through a matrix representation. We then propose
A Biryukov +23 more
core +3 more sources
Comprehensive security analysis of CRAFT
CRAFT is a lightweight block cipher, designed to provide efficient protection against differential fault attacks. It is a tweakable cipher that includes 32 rounds to produce a ciphertext from a 64-bit plaintext using a 128-bit key and 64-bit public tweak.
Hosein Hadipour +4 more
doaj +1 more source
Key Committing Security of AEZ and More
For an Authenticated Encryption with Associated Data (AEAD) scheme, the key committing security refers to the security notion of whether the adversary can produce a pair of distinct input tuples, including the key, that result in the same output.
Yu Long Chen +9 more
doaj +1 more source
HXTS: An efficient tweakable block cipher solution for enhancing sector data security
Aiming at the problems of low encryption efficiency and weak security of HCTR and XTS, this paper designs an efficient tweakable block cipher solution—HXTS to enhance the security of sector data.
Zhe Yu +6 more
doaj +1 more source
CAESAR has caused a heated discussion regarding the merits of one-pass encryption and online ciphers. The latter is a keyed, length preserving function which outputs ciphertext blocks as soon as the respective plaintext block is available as input.
Elena Andreeva +5 more
doaj +1 more source
HALFLOOP-24 is a tweakable block cipher that is used to protect automatic link establishment messages in high frequency radio, a technology commonly used by government agencies and industries that need highly robust long-distance communications.
Marcus Dansarie +3 more
doaj +1 more source
MergeMAC:A MAC for Authentication with Strict Time Constraints and Limited Bandwidth [PDF]
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time requirements and extremely limited bandwidth. MergeMAC computes the MAC by splitting the message into two parts.
Ankele, Ralph +2 more
core +2 more sources
A General Construction of Tweakable Block Ciphers and Different Modes of Operations [PDF]
This work builds on earlier work by Rogaway at Asiacrypt 2004 on tweakable block cipher (TBC) and modes of operations. Our first contribution is to generalize Rogaway's TBC construction by working over a ring and by the use of a masking sequence of functions. The ring can be instantiated as either GF or as .
Debrup Chakraborty, Palash Sarkar
openaire +1 more source
Key‐dependent side‐channel cube attack on CRAFT
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side‐channel cube attacks.
Kok‐An Pang +1 more
doaj +1 more source
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing [PDF]
Tweakable block ciphers are important primitives for designing cryptographic schemes with high security. In the absence of a standardized tweakable block cipher, constructions built from classical block ciphers remain an interesting research topic in ...
Ashwin Jha +4 more
core

