Results 21 to 30 of about 1,329 (153)
Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC
Tweakable block ciphers Kiasu-BC and Deoxys-BC are both the internal block ciphers of the candidates for the CAESAR authenticated encryption competition.
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj +1 more source
Almost-Minimal-Round BBB-Secure Tweakable Key-Alternating Feistel Block Cipher [PDF]
This paper focuses on designing a tweakable block cipher via by tweaking the Key-Alternating Feistel (KAF for short) construction. Very recently Yan et al. published a tweakable KAF construction. It provides a birthday-bound security with 4 rounds and Beyond-Birthday-Bound (BBB for short) security with 10 rounds. Following their work, we further reduce
Ming Jiang, Lei Wang
openaire +1 more source
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal +2 more
core +2 more sources
Boomerang Connectivity Table:A New Cryptanalysis Tool [PDF]
A boomerang attack is a cryptanalysis framework that regards a block cipher $E$ as the composition of two sub-ciphers $E_1\circ E_0$ and builds a particular characteristic for $E$ with probability $p^2q^2$ by combining differential characteristics for ...
A Biryukov +21 more
core +2 more sources
1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher
A multi-forkcipher (MFC) is a generalization of the forkcipher (FC) primitive introduced by Andreeva et al. at ASIACRYPT’19. An MFC is a tweakable cipher that computes s output blocks for a single input block, with s arbitrary but fixed.
Elena Andreeva +3 more
doaj +1 more source
Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation
This paper introduces and analyzes Triplex, a leakage-resistant mode of operation based on Tweakable Block Ciphers (TBCs) with 2n-bit tweaks. Triplex enjoys beyond-birthday ciphertext integrity in the presence of encryption and decryption leakage in a ...
Yaobin Shen +4 more
doaj +3 more sources
Related-Key Impossible-Differential Attack on Reduced-Round Skinny [PDF]
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK.
Ankele, Ralph +6 more
core +2 more sources
The fixslicing implementation strategy was originally introduced as a new representation for the hardware-oriented GIFT block cipher to achieve very efficient software constant-time implementations.
Alexandre Adomnicai, Thomas Peyrin
doaj +3 more sources
Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium [PDF]
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic attack applicable to cryptographic functions having a low-degree algebraic normal form over GF(2).
A. Maximov +16 more
core +2 more sources
Generic Attack on Iterated Tweakable FX Constructions [PDF]
International audienceTweakable block ciphers are increasingly becoming a common primitive to build new resilient modes as well as a concept for multiple dedicated designs.
B Cogliati +15 more
core +2 more sources

