Results 71 to 80 of about 423 (100)

Improved Rectangle Attacks on SKINNY and CRAFT [PDF]

open access: yes
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher $E$ as a composition of two sub-ciphers, i.e., $E = E_{1}\circ E_{0}$, to construct a distinguisher for $E$ with probability $p^{2}q^{2}$ by ...
Hosein Hadipour   +2 more
core  

Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128 [PDF]

open access: yesInternational Conference on Cryptology in India, 2019
Deoxys-BC is the core internal tweakable block cipher of the authenticated encryption schemes Deoxys-I and Deoxys-II. Deoxys-II is one of the six schemes in the final portfolio of the CAESAR competition, while Deoxys-I is a 3rd round candidate. By well studying the new method proposed by Cid et al.
Boxin Zhao   +3 more
semanticscholar   +4 more sources

Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256 [PDF]

open access: yesIACR Cryptology ePrint Archive, 2022
Designing symmetric ciphers for particular applications becomes a hot topic. At EUROCRYPT 2020, Naito, Sasaki and Sugawara invented the threshold implementation friendly cipher SKINNYe-64-256 to meet the requirement of the authenticated encryption ...
Lingyue Qin   +4 more
semanticscholar   +4 more sources

Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3 [PDF]

open access: yesThe Cryptographer's Track at RSA Conference, 2022
SKINNY-AEAD is one of the second-round candidates of the Lightweight Cryptography Standardization project held by NIST. SKINNY-AEAD M1 is the primary member of six SKINNY-AEAD schemes, while SKINNY-AEAD M3 is another member with a small tag.
Yanhong Fan   +4 more
semanticscholar   +4 more sources

Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis [PDF]

open access: yesIACR Cryptology ePrint Archive, 2023
The design and analysis of dedicated tweakable block ciphers constitute a dynamic and relatively recent research field in symmetric cryptanalysis. The assessment of security in the related-tweakey model is of utmost importance owing to the existence of a
Huiqin Chen   +5 more
semanticscholar   +4 more sources

Improved Related-Tweakey Boomerang Attacks on Deoxys-BC

International Conference on Cryptology in Africa, 2018
This paper improves previous distinguishers and key recovery attacks against Deoxys-BC that is a core primitive of the authenticated encryption scheme Deoxys, which is one of the remaining candidates in CAESAR. We observe that previous attacks by Cid et al. published from ToSC 2017 have a lot of room to be improved.
Yu Sasaki
semanticscholar   +2 more sources

Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256

Science China Information Sciences, 2020
In ASIACRYPT 2014, Jean et al. proposed the authentication encryption scheme Deoxys, which is one of the third-round candidates in CAESAR competition. Its internal block cipher is called Deoxys-BC that adopts the tweakey frame.
Ya Liu   +6 more
semanticscholar   +2 more sources

Home - About - Disclaimer - Privacy