Results 51 to 60 of about 423 (100)
Key-Recovery Attacks on CRAFT and WARP (Full Version) [PDF]
This paper considers the security of CRAFT and WARP. We present a practical key-recovery attack on full-round CRAFT in the related-key setting with only one differential characteristic, and the theoretical time complexity of the attack is $2^{36.09 ...
Ling Sun, Meiqin Wang, Wei Wang
core
Cryptanalysis of Block Ciphers with New Design Strategies [PDF]
Block ciphers are among the mostly widely used symmetric-key cryptographic primitives, which are fundamental building blocks in cryptographic/security systems.
Tolba, Mohamed
core
Algebraic Persistent Fault Analysis of SKINNY_64 Based on S_Box Decomposition. [PDF]
Fang X +5 more
europepmc +1 more source
SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization [PDF]
Randomized cache architectures have proven to significantly increase the complexity of contention-based cache side channel attacks and therefore pre\-sent an important building block for side channel secure microarchitectures.
Federico Canale +5 more
core
A Holistic Framework for Impossible Boomerang Attacks [PDF]
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques.
Jiahao Zhao +5 more
core
Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function [PDF]
With the dawn of quantum computers, higher security than $128$ bits has become desirable for primitives and modes. During the past decade, highly secure hash functions, MACs, and encryption schemes have been built primarily on top of keyless permutations,
Eik List +3 more
core
Improved meet-in-the-middle attack on Joltik-BC-128
The Joltik-BC, adopting the substitution-permutation network structure and Tweakey framework, was a lightweight tweakable block cipher published at ASIACRPYPT 2014. By researching the internal characteristic of the Joltik-BC, a 6-round meet-in-the-middle
LI Zheng +3 more
doaj
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework [PDF]
We propose the TWEAKEY framework with goal to unify the design of tweakable block ciphers and of block ciphers resistant to related-key attacks. Our framework is simple, extends the key-alternating construction, and allows to build a primitive with ...
Ivica Nikolić +2 more
core
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks [PDF]
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we find the right quartets which may suggest key candidates have to satisfy some nonlinear relations. However, some quartets generated always violate these relations,
Lingyue Qin +3 more
core
Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE [PDF]
Subspace trail cryptanalysis is a very recent new cryptanalysis technique, and includes differential, truncated differential, impossible differential, and integral attacks as special cases.
C Beierle +12 more
core +2 more sources

