Results 81 to 90 of about 1,329 (153)
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF. [PDF]
Jha A, Nandi M.
europepmc +1 more source
On Impossible Boomerang Attacks
The impossible boomerang attack, introduced in 2008 by Jiqiang Lu, is an extension of the impossible differential attack that relies on a boomerang distinguisher of probability 0 for discarding incorrect key guesses.
Xavier Bonnetain +4 more
doaj +1 more source
Meet‐in‐the‐middle attacks on round‐reduced tweakable block cipher Deoxys‐BC
Deoxys‐BC is a tweakable block cipher designed by Jean et al . at ASIACRYPT 2014 within the TWEAKEY framework. Then Deoxys‐BC is used in the CAESAR finalist Deoxys. In this study, the authors consider the security of Deoxys‐BC against meet‐in‐the‐middle attack in the single‐key setting. Using
Rongjia Li, Chenhui Jin
openaire +1 more source
GCM-SIV1.5: Optimal Tradeoff between GCM-SIV1 and GCM-SIV2. [PDF]
Zhang P.
europepmc +1 more source
Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound [PDF]
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a $wn$-bit (tweakable) block cipher from $n$-bit public permutations.
Benoît Cogliati, Jooyoung Lee
core
Constructions of Beyond-Birthday Secure PRFs from Random Permutations, Revisited. [PDF]
Nan J, Zhang P, Hu H.
europepmc +1 more source
Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?
AEZ is a parallelizable, AES-based authenticated encryption algorithm that is well suited for software implementations on processors equipped with the AES-NI instruction set.
Colin Chaigneau, Henri Gilbert
doaj +1 more source
Weak-keys and key-recovery attack for [Formula: see text]. [PDF]
Dutta P, Rajasree MS, Sarkar S.
europepmc +1 more source
Notions and relations for RKA-secure permutation and function families [PDF]
The theory of designing block ciphers is mature, having seen signi¯cant progress since the early 1990s for over two decades, especially during the AES devel- opment e®ort.
Ermaliza Razali (7215188) +4 more
core
The Pointer Authentication Code (PAC) feature in the Arm architecture is used to enforce the Code Flow Integrity (CFI) of running programs. It does so by generating a short MAC — called the PAC — of the return address and some additional context ...
Roberto Avanzi +2 more
doaj +1 more source

