Results 61 to 70 of about 372 (92)

Lightweight Leakage-Resilient PRNG from TBCs using Superposition [PDF]

open access: yes
In this paper, we propose a leakage-resilient pseudo-random number generator (PRNG) design that leverages the rekeying techniques of the PSV-Enc encryption scheme and the superposition property of the Superposition-Tweak-Key (STK) framework.
Mustafa Khairallah   +2 more
core  

Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation [PDF]

open access: yes, 2022
This paper reports new software implementation results for the Skinny-128 tweakable block ciphers on various SIMD architectures. More precisely, we introduce a decomposition of the 8-bit S-box into four 4-bit S-boxes in order to take advantage of vector ...
Alexandre Adomnicai   +2 more
core  

SKINNY-Based RFID Lightweight Authentication Protocol. [PDF]

open access: yesSensors (Basel), 2020
Xiao L, Xu H, Zhu F, Wang R, Li P.
europepmc   +1 more source

Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY [PDF]

open access: yes
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack.
Deng Tang, Haoyang Wang, Jianing Zhang
core  

Tortoise: An Authenticated Encryption Scheme

open access: yes
Given the open nature of the Internet, there is a need for authentication schemes to address inherent trust issues. We present Tortoise, an experimental nonce-based authenticated encryption scheme modeled on the Synthetic Counter-in-Tweak.
Odoh, Kenneth
core  

Tweaks and Keys for Block Ciphers: the TWEAKEY Framework [PDF]

open access: yes, 2015
We propose the TWEAKEY framework with goal to unify the design of tweakable block ciphers and of block ciphers resistant to related-key attacks. Our framework is simple, extends the key-alternating construction, and allows to build a primitive with ...
Ivica Nikolić   +2 more
core  

Quantum impossible differential attack. Applications to CLEFIA, AES and SKINNY [PDF]

open access: yes, 2019
International audienceThe general context Cryptography is a computer discipline that aims to protect messages through encryption systems. In symmetric cryptography, a secret parameter, called a key, is used both to encrypt and to decrypt messages.
David, Nicolas
core   +1 more source

Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool [PDF]

open access: yes
Impossible differential (ID) cryptanalysis and impossible boomerang (IB) cryptanalysis are two methods of impossible cryptanalysis against block ciphers. Since the seminal work introduced by Boura et al.
Haoyang Wang, Jianing Zhang
core  

Home - About - Disclaimer - Privacy