Results 71 to 80 of about 372 (92)
Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3 [PDF]
SKINNY-AEAD is one of the second-round candidates of the Lightweight Cryptography Standardization project held by NIST. SKINNY-AEAD M1 is the primary member of six SKINNY-AEAD schemes, while SKINNY-AEAD M3 is another member with a small tag.
Chao Niu
exaly +4 more sources
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis [PDF]
The design and analysis of dedicated tweakable block ciphers constitute a dynamic and relatively recent research field in symmetric cryptanalysis. The assessment of security in the related-tweakey model is of utmost importance owing to the existence of a
Huiqin Chen, Yongqiang Li
exaly +4 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256
Science China Information Sciences, 2019Deoxys-BC is the internal tweakable block cipher of Deoxys, a third-round authenticated encryption candidate at the CAESAR competition. In this study, by adequately studying the tweakey schedule, we seek a six-round related-tweakey impossible distinguisher of Deoxys-BC-256, which is transformed from a 3.5-round single-key impossible distinguisher of ...
Xiaoyang Dong, Xiaoyun Wang
exaly +2 more sources
Improved Related-Tweakey Boomerang Attacks on Deoxys-BC
Lecture Notes in Computer Science, 2018This paper improves previous distinguishers and key recovery attacks against Deoxys-BC that is a core primitive of the authenticated encryption scheme Deoxys, which is one of the remaining candidates in CAESAR. We observe that previous attacks by Cid et al. published from ToSC 2017 have a lot of room to be improved.
exaly +2 more sources
Related-tweakey impossible differential attack on QARMA-128
Science China Information Sciences, 2021Juan Du, Meiqin Wang, Muzhou Li
exaly +2 more sources
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256 [PDF]
Designing symmetric ciphers for particular applications becomes a hot topic. At EUROCRYPT 2020, Naito, Sasaki and Sugawara invented the threshold implementation friendly cipher SKINNYe-64-256 to meet the requirement of the authenticated encryption ...
Lingyue Qin +4 more
openaire +3 more sources
New Related-Tweakey Boomerang Attacks and Distinguishers on Deoxys-BC
Chinese Journal of ElectronicsLin Tan, Hong Xu
exaly +2 more sources

