Results 51 to 60 of about 372 (92)
Algebraic Persistent Fault Analysis of SKINNY_64 Based on S_Box Decomposition. [PDF]
Fang X +5 more
europepmc +1 more source
Cryptanalysis of QARMAv2 [PDF]
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMA with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
core
A Holistic Framework for Impossible Boomerang Attacks [PDF]
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques.
Jiahao Zhao +5 more
core
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks [PDF]
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we find the right quartets which may suggest key candidates have to satisfy some nonlinear relations. However, some quartets generated always violate these relations,
Lingyue Qin +3 more
core
Improved meet-in-the-middle attack on Joltik-BC-128
The Joltik-BC, adopting the substitution-permutation network structure and Tweakey framework, was a lightweight tweakable block cipher published at ASIACRPYPT 2014. By researching the internal characteristic of the Joltik-BC, a 6-round meet-in-the-middle
LI Zheng +3 more
doaj
Chosen-Key Distinguishing Attacks on Full AES-192, AES-256, Kiasu-BC, and More [PDF]
At CRYPTO 2020, Liu et al. find that many differentials on Gimli are actually incompatible. On the related-key differential of AES, the incompatibilities also exist and are handled in different ad-hoc ways by adding respective constraints into the ...
Phuong Pham, Shun Li, Xiaoyang Dong
core
Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function [PDF]
With the dawn of quantum computers, higher security than $128$ bits has become desirable for primitives and modes. During the past decade, highly secure hash functions, MACs, and encryption schemes have been built primarily on top of keyless permutations,
Eik List +3 more
core
Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages [PDF]
This is an extended version of the article with the same title accepted at Asiacrypt 2019.International audienceHighly efficient encryption and authentication of short messages is an essential requirement for enabling security in constrained scenarios ...
C Beierle +30 more
core +4 more sources
Exploiting Redundant Designs with Side-Channel Attacks [PDF]
Sidekanalsangrep (SKA) er en bred angrepsklasse der en angriper utnytter en uforventet informasjonslekkasje til å omgå et sikkerhetstiltak. Hvorfor skulle man orke å knekke en kryptert telefonsamtale når man kan stå i naborommet og lytte gjennom veggen ...
Costes, Nicolas
core +1 more source
SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization [PDF]
Randomized cache architectures have proven to significantly increase the complexity of contention-based cache side channel attacks and therefore pre\-sent an important building block for side channel secure microarchitectures.
Federico Canale +5 more
core

