Results 21 to 30 of about 1,329 (153)

Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Tweakable block ciphers Kiasu-BC and Deoxys-BC are both the internal block ciphers of the candidates for the CAESAR authenticated encryption competition.
Zhangjun Ma, Manman Li, Shaozhen Chen
doaj   +1 more source

Almost-Minimal-Round BBB-Secure Tweakable Key-Alternating Feistel Block Cipher [PDF]

open access: yesSymmetry, 2021
This paper focuses on designing a tweakable block cipher via by tweaking the Key-Alternating Feistel (KAF for short) construction. Very recently Yan et al. published a tweakable KAF construction. It provides a birthday-bound security with 4 rounds and Beyond-Birthday-Bound (BBB for short) security with 10 rounds. Following their work, we further reduce
Ming Jiang, Lei Wang
openaire   +1 more source

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Boomerang Connectivity Table:A New Cryptanalysis Tool [PDF]

open access: yes, 2018
A boomerang attack is a cryptanalysis framework that regards a block cipher $E$ as the composition of two sub-ciphers $E_1\circ E_0$ and builds a particular characteristic for $E$ with probability $p^2q^2$ by combining differential characteristics for ...
A Biryukov   +21 more
core   +2 more sources

1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher

open access: yesIACR Transactions on Symmetric Cryptology, 2021
A multi-forkcipher (MFC) is a generalization of the forkcipher (FC) primitive introduced by Andreeva et al. at ASIACRYPT’19. An MFC is a tweakable cipher that computes s output blocks for a single input block, with s arbitrary but fixed.
Elena Andreeva   +3 more
doaj   +1 more source

Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
This paper introduces and analyzes Triplex, a leakage-resistant mode of operation based on Tweakable Block Ciphers (TBCs) with 2n-bit tweaks. Triplex enjoys beyond-birthday ciphertext integrity in the presence of encryption and decryption leakage in a ...
Yaobin Shen   +4 more
doaj   +3 more sources

Related-Key Impossible-Differential Attack on Reduced-Round Skinny [PDF]

open access: yes, 2017
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK.
Ankele, Ralph   +6 more
core   +2 more sources

Fixslicing AES-like Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
The fixslicing implementation strategy was originally introduced as a new representation for the hardware-oriented GIFT block cipher to achieve very efficient software constant-time implementations.
Alexandre Adomnicai, Thomas Peyrin
doaj   +3 more sources

Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium [PDF]

open access: yes, 2009
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic attack applicable to cryptographic functions having a low-degree algebraic normal form over GF(2).
A. Maximov   +16 more
core   +2 more sources

Generic Attack on Iterated Tweakable FX Constructions [PDF]

open access: yes, 2020
International audienceTweakable block ciphers are increasingly becoming a common primitive to build new resilient modes as well as a concept for multiple dedicated designs.
B Cogliati   +15 more
core   +2 more sources

Home - About - Disclaimer - Privacy