Results 21 to 30 of about 372 (92)

Related-Key Impossible-Differential Attack on Reduced-Round Skinny [PDF]

open access: yes, 2017
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK.
Ankele, Ralph   +6 more
core   +2 more sources

Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule [PDF]

open access: yes, 2021
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today.
Keting Jia   +4 more
core   +2 more sources

Cryptanalysis of SKINNY in the Framework of the SKINNY 2018--2019 Cryptanalysis Competition [PDF]

open access: yes, 2019
In April 2018, Beierle et al. launched the 3rd SKINNY cryptanalysis competition, a contest that aimed at motivating the analysis of their recent tweakable block cipher SKINNY . In contrary to the previous editions, the focus was made on practical attacks:
Christof Beierle   +6 more
core   +3 more sources

Efficient and Provable White-Box Primitives [PDF]

open access: yes, 2016
International audienceIn recent years there have been several attempts to build white-box block ciphers whose implementations aim to be incompress-ible.
A Biryukov   +27 more
core   +5 more sources

Clustering Related-Tweak Characteristics: Application to MANTIS-6

open access: yesIACR Transactions on Symmetric Cryptology, 2018
The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule. Several recent attacks have analyzed the implications of this approach for differential cryptanalysis and ...
Maria Eichlseder, Daniel Kales
doaj   +1 more source

A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384.
Carlos Cid   +4 more
doaj   +1 more source

Differential Cryptanalysis on Block Cipher Skinny with MILP Program

open access: yesSecurity and Communication Networks, Volume 2018, Issue 1, 2018., 2018
With the widespread use of RFID technology and the rapid development of Internet of Things, the research of lightweight block cipher has become one of the hot issues in cryptography research. In recent years, lightweight block ciphers have emerged and are widely used, and their security is also crucial.
Pei Zhang, Wenying Zhang, Zhaoqing Pan
wiley   +1 more source

Differential Power Analysis of the SKINNY Family of Block Ciphers [PDF]

open access: yes, 2020
The SKINNY family of lightweight block ciphers is well-researched in terms of standard cryptanalysis, but little has been done in the field of power analysis attacks. By sequentially dividing and conquering, univariate Differential Power Analysis attacks
Tverråen, Martin
core  

Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE [PDF]

open access: yes, 2016
Subspace trail cryptanalysis is a very recent new cryptanalysis technique, and includes differential, truncated differential, impossible differential, and integral attacks as special cases.
C Beierle   +12 more
core   +2 more sources

Optimized Software Implementations for theLightweight Encryption Scheme ForkAE [PDF]

open access: yes, 2020
In this work we develop optimized software implementationsfor ForkAE, a second round candidate in the ongoing NIST lightweight cryptography standardization process.
Angshuman Karmakar   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy