Results 31 to 40 of about 423 (100)

The QARMAv2 Family of Tweakable Block Ciphers [PDF]

open access: yes, 2023
We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA (from FSE 2017) to improve its security bounds and allow for longer tweaks, while keeping similar latency and area.
Avanzi, Roberto   +6 more
core   +1 more source

Differential Cryptanalysis on Block Cipher Skinny with MILP Program

open access: yesSecurity and Communication Networks, Volume 2018, Issue 1, 2018., 2018
With the widespread use of RFID technology and the rapid development of Internet of Things, the research of lightweight block cipher has become one of the hot issues in cryptography research. In recent years, lightweight block ciphers have emerged and are widely used, and their security is also crucial.
Pei Zhang, Wenying Zhang, Zhaoqing Pan
wiley   +1 more source

Differential Power Analysis of the SKINNY Family of Block Ciphers [PDF]

open access: yes, 2020
The SKINNY family of lightweight block ciphers is well-researched in terms of standard cryptanalysis, but little has been done in the field of power analysis attacks. By sequentially dividing and conquering, univariate Differential Power Analysis attacks
Tverråen, Martin
core  

Optimized Software Implementations for theLightweight Encryption Scheme ForkAE [PDF]

open access: yes, 2020
In this work we develop optimized software implementationsfor ForkAE, a second round candidate in the ongoing NIST lightweight cryptography standardization process.
Angshuman Karmakar   +4 more
core   +2 more sources

A Meet-in-the-middle Attack Method of Deoxys-BC [PDF]

open access: yesJisuanji kexue
The Deoxys-BC adopting the SPN structure and TWEAK framework is a lightweight tweakable block cipher published at ASIACRPYPT 2014.By researching the internal characteristic and key schedule of the Deoxys-BC,a 6-round meet-in-the-middle distinguisher ...
LI Zheng, LI Manman, CHEN Shaozhen
doaj   +1 more source

SKINNY-AEAD and SKINNY-Hash

open access: yesIACR Transactions on Symmetric Cryptology, 2020
A comprehensive list of third-party analysis on SKINNY-128-256 and SKINNY-128-384 is documented in [2, §5.3]. In short, both variants remain secure with at least 50% security margin. To the best of our knowledge, there are two new third-party analysis [5,
Christof Beierle   +8 more
semanticscholar   +1 more source

Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256

open access: yesIEEE Access, 2018
Deoxys is a third-round candidate of the CAESAR authenticated encryption competition. In this paper, we present the first cryptanalysis of Deoxys in the single-key model.
Zilong Jiang, Chenhui Jin
doaj   +1 more source

SECURITY ANALYSIS OF LIGHTWEIGHT CRYPTOGRAPHIC ALGORITHMS [PDF]

open access: yes
The paper examines three lightweight cryptographic algorithms - SKINNY, ForkAE, and Romulus. The research focuses on evaluating their security against various cryptographic attacks. Methods used: theoretical analysis and summary.
Dimitrov, Ivaylo, Dimitrova, Dilyana
core   +3 more sources

Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks [PDF]

open access: yes, 2023
Impossible differential (ID), zero-correlation (ZC), and integral attacks are a family of important attacks on block ciphers. For example, the impossible differential attack was the first cryptanalytic attack on 7 rounds of AES.
Hosein Hadipour   +2 more
core  

SCRAMBLE-CFI: Mitigating Fault-Induced Control-Flow Attacks on OpenTitan

open access: yes, 2023
Secure elements physically exposed to adversaries are frequently targeted by fault attacks. These attacks can be utilized to hijack the control-flow of software allowing the attacker to bypass security measures, extract sensitive data, or gain full code ...
Mangard, Stefan, Nasahl, Pascal
core  

Home - About - Disclaimer - Privacy