Results 51 to 60 of about 372 (92)

Cryptanalysis of QARMAv2 [PDF]

open access: yes, 2023
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMA with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
core  

A Holistic Framework for Impossible Boomerang Attacks [PDF]

open access: yes
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques.
Jiahao Zhao   +5 more
core  

Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks [PDF]

open access: yes, 2022
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we find the right quartets which may suggest key candidates have to satisfy some nonlinear relations. However, some quartets generated always violate these relations,
Lingyue Qin   +3 more
core  

Improved meet-in-the-middle attack on Joltik-BC-128

open access: yes网络与信息安全学报
The Joltik-BC, adopting the substitution-permutation network structure and Tweakey framework, was a lightweight tweakable block cipher published at ASIACRPYPT 2014. By researching the internal characteristic of the Joltik-BC, a 6-round meet-in-the-middle
LI Zheng   +3 more
doaj  

Chosen-Key Distinguishing Attacks on Full AES-192, AES-256, Kiasu-BC, and More [PDF]

open access: yes, 2023
At CRYPTO 2020, Liu et al. find that many differentials on Gimli are actually incompatible. On the related-key differential of AES, the incompatibilities also exist and are handled in different ad-hoc ways by adding respective constraints into the ...
Phuong Pham, Shun Li, Xiaoyang Dong
core  

Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function [PDF]

open access: yes, 2020
With the dawn of quantum computers, higher security than $128$ bits has become desirable for primitives and modes. During the past decade, highly secure hash functions, MACs, and encryption schemes have been built primarily on top of keyless permutations,
Eik List   +3 more
core  

Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages [PDF]

open access: yes, 2019
This is an extended version of the article with the same title accepted at Asiacrypt 2019.International audienceHighly efficient encryption and authentication of short messages is an essential requirement for enabling security in constrained scenarios ...
C Beierle   +30 more
core   +4 more sources

Exploiting Redundant Designs with Side-Channel Attacks [PDF]

open access: yes
Sidekanalsangrep (SKA) er en bred angrepsklasse der en angriper utnytter en uforventet informasjonslekkasje til å omgå et sikkerhetstiltak. Hvorfor skulle man orke å knekke en kryptert telefonsamtale når man kan stå i naborommet og lytte gjennom veggen ...
Costes, Nicolas
core   +1 more source

SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization [PDF]

open access: yes, 2023
Randomized cache architectures have proven to significantly increase the complexity of contention-based cache side channel attacks and therefore pre\-sent an important building block for side channel secure microarchitectures.
Federico Canale   +5 more
core  

Home - About - Disclaimer - Privacy