Results 81 to 90 of about 1,329 (153)

On Impossible Boomerang Attacks

open access: yesIACR Transactions on Symmetric Cryptology
The impossible boomerang attack, introduced in 2008 by Jiqiang Lu, is an extension of the impossible differential attack that relies on a boomerang distinguisher of probability 0 for discarding incorrect key guesses.
Xavier Bonnetain   +4 more
doaj   +1 more source

Meet‐in‐the‐middle attacks on round‐reduced tweakable block cipher Deoxys‐BC

open access: yesIET Information Security, 2019
Deoxys‐BC is a tweakable block cipher designed by Jean et al . at ASIACRYPT 2014 within the TWEAKEY framework. Then Deoxys‐BC is used in the CAESAR finalist Deoxys. In this study, the authors consider the security of Deoxys‐BC against meet‐in‐the‐middle attack in the single‐key setting. Using
Rongjia Li, Chenhui Jin
openaire   +1 more source

Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound [PDF]

open access: yes, 2018
Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a $wn$-bit (tweakable) block cipher from $n$-bit public permutations.
Benoît Cogliati, Jooyoung Lee
core  

Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?

open access: yesIACR Transactions on Symmetric Cryptology, 2016
AEZ is a parallelizable, AES-based authenticated encryption algorithm that is well suited for software implementations on processors equipped with the AES-NI instruction set.
Colin Chaigneau, Henri Gilbert
doaj   +1 more source

Weak-keys and key-recovery attack for [Formula: see text]. [PDF]

open access: yesSci Rep, 2022
Dutta P, Rajasree MS, Sarkar S.
europepmc   +1 more source

Notions and relations for RKA-secure permutation and function families [PDF]

open access: yes, 2011
The theory of designing block ciphers is mature, having seen signi¯cant progress since the early 1990s for over two decades, especially during the AES devel- opment e®ort.
Ermaliza Razali (7215188)   +4 more
core  

Differential Cryptanalysis of the Reduced Pointer Authentication Code Function Used in Arm’s FEAT_PACQARMA3 Feature

open access: yesIACR Transactions on Symmetric Cryptology
The Pointer Authentication Code (PAC) feature in the Arm architecture is used to enforce the Code Flow Integrity (CFI) of running programs. It does so by generating a short MAC — called the PAC — of the return address and some additional context ...
Roberto Avanzi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy