Results 61 to 70 of about 423 (100)

Lightweight Leakage-Resilient PRNG from TBCs using Superposition [PDF]

open access: yes
In this paper, we propose a leakage-resilient pseudo-random number generator (PRNG) design that leverages the rekeying techniques of the PSV-Enc encryption scheme and the superposition property of the Superposition-Tweak-Key (STK) framework.
Mustafa Khairallah   +2 more
core  

SKINNY-Based RFID Lightweight Authentication Protocol. [PDF]

open access: yesSensors (Basel), 2020
Xiao L, Xu H, Zhu F, Wang R, Li P.
europepmc   +1 more source

Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY [PDF]

open access: yes
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack.
Deng Tang, Haoyang Wang, Jianing Zhang
core  

Tortoise: An Authenticated Encryption Scheme

open access: yes
Given the open nature of the Internet, there is a need for authentication schemes to address inherent trust issues. We present Tortoise, an experimental nonce-based authenticated encryption scheme modeled on the Synthetic Counter-in-Tweak.
Odoh, Kenneth
core  

Exploiting Redundant Designs with Side-Channel Attacks [PDF]

open access: yes
Sidekanalsangrep (SKA) er en bred angrepsklasse der en angriper utnytter en uforventet informasjonslekkasje til å omgå et sikkerhetstiltak. Hvorfor skulle man orke å knekke en kryptert telefonsamtale når man kan stå i naborommet og lytte gjennom veggen ...
Costes, Nicolas
core   +1 more source

A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers [PDF]

open access: yes
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) schemes based on a tweakable block cipher (TBC). The starting point of our work is an analysis of the mu security of the SCT-II mode which underlies the ...
Benoît Cogliati   +3 more
core   +1 more source

Quantum impossible differential attack. Applications to CLEFIA, AES and SKINNY [PDF]

open access: yes, 2019
International audienceThe general context Cryptography is a computer discipline that aims to protect messages through encryption systems. In symmetric cryptography, a secret parameter, called a key, is used both to encrypt and to decrypt messages.
David, Nicolas
core   +1 more source

Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool [PDF]

open access: yes
Impossible differential (ID) cryptanalysis and impossible boomerang (IB) cryptanalysis are two methods of impossible cryptanalysis against block ciphers. Since the seminal work introduced by Boura et al.
Haoyang Wang, Jianing Zhang
core  

Home - About - Disclaimer - Privacy