Results 91 to 100 of about 1,329 (153)

Differential-Linear Cryptanalysis and Cube Attacks on ChiLow

open access: yesIACR Transactions on Symmetric Cryptology
ChiLow is a family of tweakable block ciphers specifically designed for embedded code encryption, proposed at EUROCRYPT 2025. Its novel nested tweakkey schedule and a variant of the χ function significantly enhance latency and energy efficiency.
Cheng Che, Tian Tian
doaj   +1 more source

BEANIE – A 32-bit Cipher for Cryptographic Mitigations Against Software Attacks

open access: yesIACR Transactions on Symmetric Cryptology
In modern CPU architectures, various security features to mitigate software attacks can be found. Examples of such features are logical isolation, memory tagging or shadow stacks. Basing such features on cryptographic isolation instead of logical checks
Simon Gerhalter   +9 more
doaj   +1 more source

Type-2 Generalized Feistel Structures Based on Tweakable Block Ciphers, Reconsidered

open access: yesIACR Communications in Cryptology
Generalized Feistel structures (GFSs) generalize a Feistel structure to have more flexible input length. Among them, Zheng et al. originally introduced type-2 GFS (CRYPTO '89) from pseudorandom functions (PRFs). This can be naturally instantiated with tweakable block ciphers (TBCs), which was analyzed by Nakaya and Iwata (ToSC 2022/FSE 2023). For a
Kento Tsuji, Tetsu Iwata
openaire   +1 more source

Optimally Secure TBC Based Accordion Mode [PDF]

open access: yes
The design of tweakable wide block ciphers has advanced significantly over the past two decades. This evolution began with the approach of designing a wide block cipher by Naor and Reingold.
Avijit Dutta   +3 more
core  

Integral attacks on reduced-round Deoxys-BC and RAIN algorithms

open access: yesTongxin xuebao
Considering the impact of tweakeys on tweakable block cipher algorithms, achieved integral attacks on Deoxys-BC and RAIN algorithms by combining zero-correlation linear cryptanalysis with integral attacks and utilizing partial-sum technique. 176 types of
Du Xiaoni   +3 more
doaj  

Disk Encryption: Scrutinizing IEEE Standard 1619XTS-AES [PDF]

open access: yes, 2009
Disk encryption has changed during the last decade from being a mechanism only used by corporate executives and government agencies for their top secret information, to become trivially feasible for everyone to utilize.
Alam, Adnan Vaseem
core  

SKINNY-Based RFID Lightweight Authentication Protocol. [PDF]

open access: yesSensors (Basel), 2020
Xiao L, Xu H, Zhu F, Wang R, Li P.
europepmc   +1 more source

Home - About - Disclaimer - Privacy