Results 41 to 50 of about 1,329 (153)

Mini-ciphers: a reliable testbed for cryptanalysis? [PDF]

open access: yes, 2009
This paper reports on higher-order square analysis of the AES cipher. We present experimental results of attack simulations on mini-AES versions with word sizes of 3, 4, 5, 6 and 7 bits and describe the propagation of higher-order Lambda-sets inside some
Nakahara, Jorge   +1 more
core   +1 more source

Cryptanalysis of Forkciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2020
The forkcipher framework was designed in 2018 by Andreeva et al. for authenticated encryption of short messages. Two dedicated ciphers were proposed in this framework: ForkAES based on the AES (and its tweakable variant Kiasu-BC), and ForkSkinny based on
Augustin Bariant   +2 more
doaj   +1 more source

The related-key analysis of feistel constructions [PDF]

open access: yes, 2014
Lecture Notes in Computer Science, Volume 8540, 2015.It is well known that the classical three- and four-round Feistel constructions are provably secure under chosen-plaintext and chosen-ciphertext attacks, respectively.
A Biryukov   +34 more
core   +1 more source

THF: Designing Low-Latency Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology
We introduce the Three-Hash Framework (THF), a new instantiation of the LRW+ paradigm that employs three hash functions to process tweak inputs. We prove that THF achieves beyond-birthday-bound security under standard assumptions.
Jianhua Wang   +5 more
doaj   +1 more source

Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2020
This paper defines Spook: a sponge-based authenticated encryption with associated data algorithm. It is primarily designed to provide security against side-channel attacks at a low energy cost. For this purpose, Spook is mixing a leakageresistant mode of
Davide Bellizia   +14 more
doaj   +1 more source

07381 Abstracts Collection -- Cryptography [PDF]

open access: yes, 2008
From 16.09.2007 to 21.09.2007 the Dagstuhl Seminar 07381 ``Cryptography\u27\u27 was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl.
  +3 more
core   +1 more source

Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers [PDF]

open access: yes, 2016
We propose the Synthetic Counter-in-Tweak $$\mathsf {SCT}$$ mode, which turns a tweakable block cipher into a nonce-based authenticated encryption scheme with associated data. The $$\mathsf {SCT}$$ mode combines in a SIV-like manner a Wegman-Carter MAC inspired from $$\mathsf {PMAC}$$ for the authentication part and a new counter-like mode for the ...
Thomas Peyrin, Yannick Seurin
openaire   +1 more source

Elastic Block Ciphers: Method, Security and Instantiations [PDF]

open access: yes, 2009
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size ...
Cook, Debra L.   +2 more
core   +3 more sources

MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC

open access: yesIEEE Access, 2019
In this paper, we study the relation of related-tweak/key impossible differentials with single-key ones. Following a heuristic strategy, we can derive longer related-tweak/key impossible differentials from single-key ones. We implement this strategy with
Rui Zong, Xiaoyang Dong
doaj   +1 more source

Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos

open access: yesIACR Transactions on Symmetric Cryptology, 2021
This work investigates a generic way of combining two very effective and well-studied cryptanalytic tools, proposed almost 18 years apart, namely the boomerang attack introduced by Wagner in FSE 1999 and the yoyo attack by Ronjom et al. in Asiacrypt 2017.
Mostafizar Rahman   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy