Results 81 to 90 of about 423 (100)
Some of the next articles are maybe not open access.

Related-tweakey impossible differential attack on QARMA-128

Science China Information Sciences, 2021
Juan Du   +3 more
semanticscholar   +2 more sources

Related-Key Impossible-Differential Attack on Reduced-Round Skinny [PDF]

open access: yesInternational Conference on Applied Cryptography and Network Security, 2017
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK.
Ralph Ankele   +6 more
semanticscholar   +4 more sources

Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT [PDF]

open access: yesDesigns, Codes and Cryptography, 2020
This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers with linear key schedule. As a proof of work, we apply
Boxin Zhao   +4 more
semanticscholar   +3 more sources

Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BC

Information Security Practice and Experience
Kangkang Shi   +2 more
semanticscholar   +2 more sources

Impossible Differential Cryptanalysis of Reduced-Round SKINNY [PDF]

open access: yesInternational Conference on Cryptology in Africa, 2017
SKINNY is a new lightweight tweakable block cipher family proposed by Beierle $et$ $al$. in CRYPTO 2016. SKINNY-$n$-$t$ is a block cipher with $n$-bit state and $t$-bit tweakey (key and tweak).
Mohamed F. Tolba   +2 more
semanticscholar   +3 more sources

Generalized impossible differential attacks on block ciphers: application to SKINNY and ForkSKINNY [PDF]

open access: yesDesigns, Codes and Cryptography
Impossible differential cryptanalysis is a crucial cryptanalytical method for symmetric ciphers. Given an impossible differential, the key recovery attack typically proceeds in two steps: generating pairs of data and then identifying wrong keys using the
Ling Song   +4 more
semanticscholar   +3 more sources

Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and Tweakeys

2021
The original zero-correlation linear attack on a tweakable block cipher \(E_{K, T}\) (\(E_{K, T}\) is an ordinary block cipher when \(|T| = 0\)) with key K and tweak T exploits linear approximations \(\langle \alpha , x \rangle \oplus \langle \beta , E_{K,T}(x) \rangle \) with correlation zero for any fixed K and T, where the correlation is computed ...
Chao Niu   +3 more
openaire   +1 more source

A Practical Forgery Attack on Lilliput-AE [PDF]

open access: yesJournal of Cryptology, 2019
Lilliput-AE is a tweakable block cipher submitted as a candidate to the NIST lightweight cryptography standardization process. It is based upon the lightweight block cipher Lilliput, whose cryptanalysis so far suggests that it has a large security margin.
O. Dunkelman   +3 more
semanticscholar   +3 more sources

Meet-in-the-middle attacks on round-reduced tweakable block cipher Deoxys-BC

IET Information Security, 2019
Deoxys-BC is a tweakable block cipher designed by Jean et al. at ASIACRYPT 2014 within the TWEAKEY framework. Then Deoxys-BC is used in the CAESAR finalist Deoxys.
Rongjia Li, Chenhui Jin
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy