A Meet-in-the-middle Attack Method of Deoxys-BC [PDF]
The Deoxys-BC adopting the SPN structure and TWEAK framework is a lightweight tweakable block cipher published at ASIACRPYPT 2014.By researching the internal characteristic and key schedule of the Deoxys-BC,a 6-round meet-in-the-middle distinguisher ...
LI Zheng, LI Manman, CHEN Shaozhen
doaj +1 more source
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM
In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis.
Ashutosh Dhar Dwivedi +3 more
doaj +1 more source
A Study of Key Management for Encrypted Storage in Storage Area Network [PDF]
As secure storage becomes more pervasive throughout the enterprise, the focus quickly moves from implementing encrypting storage devices to establishing effective and secure key management policies.
Hai Xin LU
core
Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound [PDF]
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a $wn$-bit (tweakable) block cipher from $n$-bit public permutations.
Benoît Cogliati, Jooyoung Lee
core
GCM-SIV1.5: Optimal Tradeoff between GCM-SIV1 and GCM-SIV2. [PDF]
Zhang P.
europepmc +1 more source
BBB Secure Arbitrary Length Tweak TBC from n-bit Block Ciphers [PDF]
At FSE\u2715, Mennink introduced two tweakable block ciphers, $\widetilde{F}[1]$ and $\widetilde{F}[2]$, both utilizing an $n$-bit tweak. It was demonstrated that $\widetilde{F}[1]$ is secure for up to $2^{2n/3}$ queries, while $\widetilde{F}[2]$ is ...
Arghya Bhattacharjee +4 more
core
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF. [PDF]
Jha A, Nandi M.
europepmc +1 more source
Meet‐in‐the‐middle attacks on round‐reduced tweakable block cipher Deoxys‐BC
Deoxys‐BC is a tweakable block cipher designed by Jean et al . at ASIACRYPT 2014 within the TWEAKEY framework. Then Deoxys‐BC is used in the CAESAR finalist Deoxys. In this study, the authors consider the security of Deoxys‐BC against meet‐in‐the‐middle attack in the single‐key setting. Using
Rongjia Li, Chenhui Jin
openaire +1 more source
Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate
Authenticated Encryption (AE) modes of operation based on Tweakable Block Ciphers (TBC) usually measure efficiency in the number of calls to the underlying primitive per message block. On the one hand, many existing solutions reach a primitive-rate of 1,
Yaobin Shen +2 more
doaj +1 more source
Efficient Implementation of NIST LWC ESTATE Algorithm Using OpenCL and Web Assembly for Secure Communication in Edge Computing Environment. [PDF]
Park B, Seo SC.
europepmc +1 more source

