Results 51 to 60 of about 423 (100)

Key-Recovery Attacks on CRAFT and WARP (Full Version) [PDF]

open access: yes, 2022
This paper considers the security of CRAFT and WARP. We present a practical key-recovery attack on full-round CRAFT in the related-key setting with only one differential characteristic, and the theoretical time complexity of the attack is $2^{36.09 ...
Ling Sun, Meiqin Wang, Wei Wang
core  

Cryptanalysis of Block Ciphers with New Design Strategies [PDF]

open access: yes, 2017
Block ciphers are among the mostly widely used symmetric-key cryptographic primitives, which are fundamental building blocks in cryptographic/security systems.
Tolba, Mohamed
core  

SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization [PDF]

open access: yes, 2023
Randomized cache architectures have proven to significantly increase the complexity of contention-based cache side channel attacks and therefore pre\-sent an important building block for side channel secure microarchitectures.
Federico Canale   +5 more
core  

A Holistic Framework for Impossible Boomerang Attacks [PDF]

open access: yes
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques.
Jiahao Zhao   +5 more
core  

Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function [PDF]

open access: yes, 2020
With the dawn of quantum computers, higher security than $128$ bits has become desirable for primitives and modes. During the past decade, highly secure hash functions, MACs, and encryption schemes have been built primarily on top of keyless permutations,
Eik List   +3 more
core  

Improved meet-in-the-middle attack on Joltik-BC-128

open access: yes网络与信息安全学报
The Joltik-BC, adopting the substitution-permutation network structure and Tweakey framework, was a lightweight tweakable block cipher published at ASIACRPYPT 2014. By researching the internal characteristic of the Joltik-BC, a 6-round meet-in-the-middle
LI Zheng   +3 more
doaj  

Tweaks and Keys for Block Ciphers: the TWEAKEY Framework [PDF]

open access: yes, 2015
We propose the TWEAKEY framework with goal to unify the design of tweakable block ciphers and of block ciphers resistant to related-key attacks. Our framework is simple, extends the key-alternating construction, and allows to build a primitive with ...
Ivica Nikolić   +2 more
core  

Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks [PDF]

open access: yes, 2022
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we find the right quartets which may suggest key candidates have to satisfy some nonlinear relations. However, some quartets generated always violate these relations,
Lingyue Qin   +3 more
core  

Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE [PDF]

open access: yes, 2016
Subspace trail cryptanalysis is a very recent new cryptanalysis technique, and includes differential, truncated differential, impossible differential, and integral attacks as special cases.
C Beierle   +12 more
core   +2 more sources

Home - About - Disclaimer - Privacy