Results 81 to 90 of about 372 (92)
Some of the next articles are maybe not open access.

Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT [PDF]

open access: yesDesigns, Codes, and Cryptography, 2020
This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers with linear key schedule. As a proof of work, we apply
Xiaoyang Dong, Willi Meier, Keting Jia
exaly   +2 more sources

Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and Tweakeys

2021
The original zero-correlation linear attack on a tweakable block cipher \(E_{K, T}\) (\(E_{K, T}\) is an ordinary block cipher when \(|T| = 0\)) with key K and tweak T exploits linear approximations \(\langle \alpha , x \rangle \oplus \langle \beta , E_{K,T}(x) \rangle \) with correlation zero for any fixed K and T, where the correlation is computed ...
Chao Niu   +3 more
openaire   +1 more source

A Practical Forgery Attack on Lilliput-AE [PDF]

open access: yesJournal of Cryptology, 2019
Lilliput-AE is a tweakable block cipher submitted as a candidate to the NIST lightweight cryptography standardization process. It is based upon the lightweight block cipher Lilliput, whose cryptanalysis so far suggests that it has a large security margin.
Orr Dunkelman, Nathan Keller
exaly   +2 more sources

Generalized impossible differential attacks on block ciphers: application to SKINNY and ForkSKINNY [PDF]

open access: yesDesigns, Codes, and Cryptography
Impossible differential cryptanalysis is a crucial cryptanalytical method for symmetric ciphers. Given an impossible differential, the key recovery attack typically proceeds in two steps: generating pairs of data and then identifying wrong keys using the
Ling Song, Lei Hu, Yin Lv
exaly   +2 more sources

Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256

Lecture Notes in Computer Science, 2023
Lingyue Qin, Jialiang Hua, Xiaoyun Wang
exaly  

Zero-correlation linear attack on reduced-round SKINNY

Frontiers of Computer Science, 2022
exaly  

Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64

Lecture Notes in Computer Science, 2020
Orr Dunkelman
exaly  

Square Attack on 7-Round Kiasu-BC

Lecture Notes in Computer Science, 2016
Christoph Dobraunig, Maria Eichlseder
exaly  

Home - About - Disclaimer - Privacy