Results 71 to 80 of about 423 (100)
Improved Rectangle Attacks on SKINNY and CRAFT [PDF]
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher $E$ as a composition of two sub-ciphers, i.e., $E = E_{1}\circ E_{0}$, to construct a distinguisher for $E$ with probability $p^{2}q^{2}$ by ...
Hosein Hadipour +2 more
core
Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128 [PDF]
Deoxys-BC is the core internal tweakable block cipher of the authenticated encryption schemes Deoxys-I and Deoxys-II. Deoxys-II is one of the six schemes in the final portfolio of the CAESAR competition, while Deoxys-I is a 3rd round candidate. By well studying the new method proposed by Cid et al.
Boxin Zhao +3 more
semanticscholar +4 more sources
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256 [PDF]
Designing symmetric ciphers for particular applications becomes a hot topic. At EUROCRYPT 2020, Naito, Sasaki and Sugawara invented the threshold implementation friendly cipher SKINNYe-64-256 to meet the requirement of the authenticated encryption ...
Lingyue Qin +4 more
semanticscholar +4 more sources
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3 [PDF]
SKINNY-AEAD is one of the second-round candidates of the Lightweight Cryptography Standardization project held by NIST. SKINNY-AEAD M1 is the primary member of six SKINNY-AEAD schemes, while SKINNY-AEAD M3 is another member with a small tag.
Yanhong Fan +4 more
semanticscholar +4 more sources
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis [PDF]
The design and analysis of dedicated tweakable block ciphers constitute a dynamic and relatively recent research field in symmetric cryptanalysis. The assessment of security in the related-tweakey model is of utmost importance owing to the existence of a
Huiqin Chen +5 more
semanticscholar +4 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Improved Related-Tweakey Boomerang Attacks on Deoxys-BC
International Conference on Cryptology in Africa, 2018This paper improves previous distinguishers and key recovery attacks against Deoxys-BC that is a core primitive of the authenticated encryption scheme Deoxys, which is one of the remaining candidates in CAESAR. We observe that previous attacks by Cid et al. published from ToSC 2017 have a lot of room to be improved.
Yu Sasaki
semanticscholar +2 more sources
Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256
Science China Information Sciences, 2020In ASIACRYPT 2014, Jean et al. proposed the authentication encryption scheme Deoxys, which is one of the third-round candidates in CAESAR competition. Its internal block cipher is called Deoxys-BC that adopts the tweakey frame.
Ya Liu +6 more
semanticscholar +2 more sources

