Differential-Linear Cryptanalysis and Cube Attacks on ChiLow
ChiLow is a family of tweakable block ciphers specifically designed for embedded code encryption, proposed at EUROCRYPT 2025. Its novel nested tweakkey schedule and a variant of the χ function significantly enhance latency and energy efficiency.
Cheng Che, Tian Tian
doaj +1 more source
BEANIE – A 32-bit Cipher for Cryptographic Mitigations Against Software Attacks
In modern CPU architectures, various security features to mitigate software attacks can be found. Examples of such features are logical isolation, memory tagging or shadow stacks. Basing such features on cryptographic isolation instead of logical checks
Simon Gerhalter +9 more
doaj +1 more source
Type-2 Generalized Feistel Structures Based on Tweakable Block Ciphers, Reconsidered
Generalized Feistel structures (GFSs) generalize a Feistel structure to have more flexible input length. Among them, Zheng et al. originally introduced type-2 GFS (CRYPTO '89) from pseudorandom functions (PRFs). This can be naturally instantiated with tweakable block ciphers (TBCs), which was analyzed by Nakaya and Iwata (ToSC 2022/FSE 2023). For a
Kento Tsuji, Tetsu Iwata
openaire +1 more source
Optimally Secure TBC Based Accordion Mode [PDF]
The design of tweakable wide block ciphers has advanced significantly over the past two decades. This evolution began with the approach of designing a wide block cipher by Naor and Reingold.
Avijit Dutta +3 more
core
Integral attacks on reduced-round Deoxys-BC and RAIN algorithms
Considering the impact of tweakeys on tweakable block cipher algorithms, achieved integral attacks on Deoxys-BC and RAIN algorithms by combining zero-correlation linear cryptanalysis with integral attacks and utilizing partial-sum technique. 176 types of
Du Xiaoni +3 more
doaj
Disk Encryption: Scrutinizing IEEE Standard 1619XTS-AES [PDF]
Disk encryption has changed during the last decade from being a mechanism only used by corporate executives and government agencies for their top secret information, to become trivially feasible for everyone to utilize.
Alam, Adnan Vaseem
core
SKINNY-Based RFID Lightweight Authentication Protocol. [PDF]
Xiao L, Xu H, Zhu F, Wang R, Li P.
europepmc +1 more source
On the Hardware Implementation Efficiency of CAESAR Authentication Ciphers for FPGA Devices [PDF]
Kitsos, Paris +2 more
core +2 more sources
MEAS: memory encryption and authentication secure against side-channel attacks. [PDF]
Unterluggauer T, Werner M, Mangard S.
europepmc +1 more source
NFBC: an efficient FPGA based NFSR-oriented lightweight block cipher suitable for embedded system. [PDF]
Chatterjee R, Chakraborty R.
europepmc +1 more source

