Zobrazeno 1 - 10
of 126
pro vyhledávání: '"Beyond Birthday"'
Autor:
Charlotte Lefevre, Bart Mennink
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 1 (2024)
It is known that the sponge construction is tightly indifferentiable from a random oracle up to around 2c/2 queries, where c is the capacity. In particular, it cannot provide generic security better than half of the underlying permutation size. In th
Externí odkaz:
https://doaj.org/article/ffcaa6b9c15042bea99167345dabd48a
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 4 (2023)
In CRYPTO’02, Liskov et al. introduced the concept of a tweakable block cipher, a novel symmetric key primitive with promising applications. They put forth two constructions for designing such tweakable block ciphers from conventional block ciphers
Externí odkaz:
https://doaj.org/article/95cd079e0afd4acb807ed70046ce93d3
Autor:
Akiko Inoue
Publikováno v:
IET Information Security, Vol 16, Iss 4, Pp 253-261 (2022)
Abstract The security bound is an important evaluation criterion in an authenticated encryption (AE) scheme. Many AE schemes that are widely used have birthday‐bound security, which means that the scheme has b/2‐bit security, where b is the block
Externí odkaz:
https://doaj.org/article/a108d543845b433686f2c4f53c3e05f9
Autor:
Ping Zhang
Publikováno v:
Entropy, Vol 25, Iss 1, p 107 (2023)
GCM-SIV2 is a nonce-based beyond-birthday-bound (BBB)-secure authenticated encryption (AE) mode introduced by Iwata and Minematsu at FSE 2017. However, it is built by combining two instances of GCM-SIV1 and needs eight keys, which increases the costs
Externí odkaz:
https://doaj.org/article/3aff64eacdc5499683f7f7a3e94bf9c4
Autor:
Benoît Cogliati, Jordan Ethan, Virginie Lallemand, Byeonghak Lee, Jooyoung Lee, Marine Minier
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 4 (2021)
In this work, we propose a construction of 2-round tweakable substitutionpermutation networks using a single secret S-box. This construction is based on non-linear permutation layers using independent round keys, and achieves security beyond the birt
Externí odkaz:
https://doaj.org/article/2edadb90ee6c48bebdfd14200ff2bf8d
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 3 (2021)
In this paper, a new lightweight authenticated encryption scheme AESLBBB is proposed, which was designed to provide backward compatibility with advanced encryption standard (AES) as well as high security and low memory. The primary design goal, backw
Externí odkaz:
https://doaj.org/article/ed6af4ef62f5415c9d55bb48aa01b500
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 4 (2020)
This paper proposes a new lightweight deterministic authenticated encryption (DAE) scheme providing 128-bit security. Lightweight DAE schemes are practically important because resource-restricted devices sometimes cannot afford to manage a nonce prop
Externí odkaz:
https://doaj.org/article/8cd90c24c1d44b9fa31b370daa084e5b
Autor:
Ryota Nakamichi, Tetsu Iwata
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2019, Iss 4 (2020)
We consider a problem of constructing a secure block cipher from a tweakable block cipher (TBC) with long tweaks. Given a TBC with n-bit blocks and Γn-bit tweaks for Γ ≥ 1, one of the constructions by Minematsu in DCC 2015 shows that a simple ite
Externí odkaz:
https://doaj.org/article/87e58ecc2a6043e49eecd065f96851cc