Lightweight Leakage-Resilient PRNG from TBCs using Superposition [PDF]
In this paper, we propose a leakage-resilient pseudo-random number generator (PRNG) design that leverages the rekeying techniques of the PSV-Enc encryption scheme and the superposition property of the Superposition-Tweak-Key (STK) framework.
Mustafa Khairallah +2 more
core
SKINNY-Based RFID Lightweight Authentication Protocol. [PDF]
Xiao L, Xu H, Zhu F, Wang R, Li P.
europepmc +1 more source
Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY [PDF]
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack.
Deng Tang, Haoyang Wang, Jianing Zhang
core
Tortoise: An Authenticated Encryption Scheme
Given the open nature of the Internet, there is a need for authentication schemes to address inherent trust issues. We present Tortoise, an experimental nonce-based authenticated encryption scheme modeled on the Synthetic Counter-in-Tweak.
Odoh, Kenneth
core
Exploiting Redundant Designs with Side-Channel Attacks [PDF]
Sidekanalsangrep (SKA) er en bred angrepsklasse der en angriper utnytter en uforventet informasjonslekkasje til å omgå et sikkerhetstiltak. Hvorfor skulle man orke å knekke en kryptert telefonsamtale når man kan stå i naborommet og lytte gjennom veggen ...
Costes, Nicolas
core +1 more source
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers [PDF]
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) schemes based on a tweakable block cipher (TBC). The starting point of our work is an analysis of the mu security of the SCT-II mode which underlies the ...
Benoît Cogliati +3 more
core +1 more source
Quantum impossible differential attack. Applications to CLEFIA, AES and SKINNY [PDF]
International audienceThe general context Cryptography is a computer discipline that aims to protect messages through encryption systems. In symmetric cryptography, a secret parameter, called a key, is used both to encrypt and to decrypt messages.
David, Nicolas
core +1 more source
Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool [PDF]
Impossible differential (ID) cryptanalysis and impossible boomerang (IB) cryptanalysis are two methods of impossible cryptanalysis against block ciphers. Since the seminal work introduced by Boura et al.
Haoyang Wang, Jianing Zhang
core
Improving dependability with low power fault detection model for skinny-hash. [PDF]
Arvind Barge S, Mary GI.
europepmc +1 more source
Augmented sets of output differences and new distinguishers for SPN ciphers. [PDF]
Girme R, Rohit R, Sarkar S.
europepmc +1 more source

