Results 61 to 70 of about 372 (92)
Lightweight Leakage-Resilient PRNG from TBCs using Superposition [PDF]
In this paper, we propose a leakage-resilient pseudo-random number generator (PRNG) design that leverages the rekeying techniques of the PSV-Enc encryption scheme and the superposition property of the Superposition-Tweak-Key (STK) framework.
Mustafa Khairallah +2 more
core
Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation [PDF]
This paper reports new software implementation results for the Skinny-128 tweakable block ciphers on various SIMD architectures. More precisely, we introduce a decomposition of the 8-bit S-box into four 4-bit S-boxes in order to take advantage of vector ...
Alexandre Adomnicai +2 more
core
SKINNY-Based RFID Lightweight Authentication Protocol. [PDF]
Xiao L, Xu H, Zhu F, Wang R, Li P.
europepmc +1 more source
Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY [PDF]
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack.
Deng Tang, Haoyang Wang, Jianing Zhang
core
Tortoise: An Authenticated Encryption Scheme
Given the open nature of the Internet, there is a need for authentication schemes to address inherent trust issues. We present Tortoise, an experimental nonce-based authenticated encryption scheme modeled on the Synthetic Counter-in-Tweak.
Odoh, Kenneth
core
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework [PDF]
We propose the TWEAKEY framework with goal to unify the design of tweakable block ciphers and of block ciphers resistant to related-key attacks. Our framework is simple, extends the key-alternating construction, and allows to build a primitive with ...
Ivica Nikolić +2 more
core
Quantum impossible differential attack. Applications to CLEFIA, AES and SKINNY [PDF]
International audienceThe general context Cryptography is a computer discipline that aims to protect messages through encryption systems. In symmetric cryptography, a secret parameter, called a key, is used both to encrypt and to decrypt messages.
David, Nicolas
core +1 more source
Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool [PDF]
Impossible differential (ID) cryptanalysis and impossible boomerang (IB) cryptanalysis are two methods of impossible cryptanalysis against block ciphers. Since the seminal work introduced by Boura et al.
Haoyang Wang, Jianing Zhang
core
Improving dependability with low power fault detection model for skinny-hash. [PDF]
Arvind Barge S, Mary GI.
europepmc +1 more source
Augmented sets of output differences and new distinguishers for SPN ciphers. [PDF]
Girme R, Rohit R, Sarkar S.
europepmc +1 more source

