Results 71 to 80 of about 372 (92)

Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3 [PDF]

open access: yesLecture Notes in Computer Science, 2022
SKINNY-AEAD is one of the second-round candidates of the Lightweight Cryptography Standardization project held by NIST. SKINNY-AEAD M1 is the primary member of six SKINNY-AEAD schemes, while SKINNY-AEAD M3 is another member with a small tag.
Chao Niu
exaly   +4 more sources

Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis [PDF]

open access: yesLecture Notes in Computer Science, 2023
The design and analysis of dedicated tweakable block ciphers constitute a dynamic and relatively recent research field in symmetric cryptanalysis. The assessment of security in the related-tweakey model is of utmost importance owing to the existence of a
Huiqin Chen, Yongqiang Li
exaly   +4 more sources

Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256

Science China Information Sciences, 2019
Deoxys-BC is the internal tweakable block cipher of Deoxys, a third-round authenticated encryption candidate at the CAESAR competition. In this study, by adequately studying the tweakey schedule, we seek a six-round related-tweakey impossible distinguisher of Deoxys-BC-256, which is transformed from a 3.5-round single-key impossible distinguisher of ...
Xiaoyang Dong, Xiaoyun Wang
exaly   +2 more sources

Improved Related-Tweakey Boomerang Attacks on Deoxys-BC

Lecture Notes in Computer Science, 2018
This paper improves previous distinguishers and key recovery attacks against Deoxys-BC that is a core primitive of the authenticated encryption scheme Deoxys, which is one of the remaining candidates in CAESAR. We observe that previous attacks by Cid et al. published from ToSC 2017 have a lot of room to be improved.
exaly   +2 more sources

Related-tweakey impossible differential attack on QARMA-128

Science China Information Sciences, 2021
Juan Du, Meiqin Wang, Muzhou Li
exaly   +2 more sources

Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256 [PDF]

open access: yes, 2022
Designing symmetric ciphers for particular applications becomes a hot topic. At EUROCRYPT 2020, Naito, Sasaki and Sugawara invented the threshold implementation friendly cipher SKINNYe-64-256 to meet the requirement of the authenticated encryption ...
Lingyue Qin   +4 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy