Results 11 to 20 of about 1,329 (153)

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights.
Ralph Ankele   +5 more
doaj   +5 more sources

Tweakable Block Ciphers [PDF]

open access: yesJournal of Cryptology, 2002
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Liskov, Moses   +2 more
openaire   +5 more sources

Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
The use of a small block length is a common strategy when designing lightweight (tweakable) block ciphers (TBCs), and several 64-bit primitives have been proposed.
Yusuke Naito, Takeshi Sugawara
doaj   +3 more sources

Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Tweakable block ciphers (TBCs) have proven highly useful to boost the security guarantees of authentication schemes. In 2017, Cogliati et al. proposed two MACs combining TBC and universal hash functions: a nonce-based MAC called NaT and a deterministic ...
Wonseok Choi   +6 more
doaj   +4 more sources

A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384.
Carlos Cid   +4 more
doaj   +3 more sources

Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks [PDF]

open access: yes, 2018
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a wn-bit block cipher from n-bit public permutations (often called S-boxes), which alternate keyless and “local” substitution steps utilizing such S-boxes, with keyed and “global” permutation steps which are non-cryptographic.
Cogliati, Benoît-Michel   +6 more
openaire   +5 more sources

Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model [PDF]

open access: yes, 2018
We propose a new construction of tweakable block ciphers from standard block ciphers. Our construction, dubbed \(\mathsf {XHX2}\), is the cascade of two independent \(\mathsf {XHX}\) block ciphers, so it makes two calls to the underlying block cipher using tweak-dependent keys.
ByeongHak Lee, Jooyoung Lee
openaire   +3 more sources

CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2019
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryptanalytic security.
Christof Beierle   +3 more
doaj   +4 more sources

KLEIN: A New Family of Lightweight Block Ciphers [PDF]

open access: yes, 2010
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov   +39 more
core   +19 more sources

Cascading Four Round LRW1 is Beyond Birthday Bound Secure

open access: yesIACR Transactions on Symmetric Cryptology, 2023
In CRYPTO’02, Liskov et al. introduced the concept of a tweakable block cipher, a novel symmetric key primitive with promising applications. They put forth two constructions for designing such tweakable block ciphers from conventional block ciphers ...
Nilanjan Datta   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy