Zobrazeno 1 - 10
of 42
pro vyhledávání: '"Jérémy Jean"'
Autor:
Dahmun Goudarzi, Jérémy Jean, Stefan Kölbl, Thomas Peyrin, Matthieu Rivain, Yu Sasaki, Siang Meng Sim
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
This paper introduces Pyjamask, a new block cipher family and authenticated encryption proposal submitted to the NIST lightweight cryptography standardization process. Pyjamask targets side-channel resistance as one of its main goal. More precisely,
Externí odkaz:
https://doaj.org/article/9eed4702b5994a3fb5deaa4a5fee3fed
Autor:
Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family of tweakable block ciphers, which was presented at CRYPTO 2016, as the underl
Externí odkaz:
https://doaj.org/article/70c29ec3f4f24e6dac16a54472b4ee05
Autor:
Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jian Guo, Jérémy Jean, Jean-René Reinhard, Ling Song
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 5-28 (2018)
This paper presents a cryptanalysis of full Kravatte, an instantiation of the Farfalle construction of a pseudorandom function (PRF) with variable input and output length. This new construction, proposed by Bertoni et al., introduces an efficiently p
Externí odkaz:
https://doaj.org/article/d15c4536fc4148a0a877b139c5882a22
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 130-168 (2017)
We study the synthesis of small functions used as building blocks in lightweight cryptographic designs in terms of hardware implementations. This phase most notably appears during the ASIC implementation of cryptographic primitives. The quality of th
Externí odkaz:
https://doaj.org/article/7bd78d763b4049c7ba17d67c3d745d8d
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 156-174 (2017)
NORX is an authenticated encryption scheme with associated data being publicly scrutinized as part of the ongoing CAESAR competition, where 14 other primitives are also competing. It is based on the sponge construction and relies on a simple permutat
Externí odkaz:
https://doaj.org/article/288ebd2402074ee78854ddef5102f471
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 307-337 (2017)
We show generic attacks on unbalanced Feistel ciphers based on the meet-in-the-middle technique. We analyze two general classes of unbalanced Feistel structures, namely contracting Feistels and expanding Feistels. In both of the cases, we consider th
Externí odkaz:
https://doaj.org/article/e3011a3406744dfea1334883d19dd28a
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 33-56 (2016)
We present an invariant subspace attack on the block cipher Midori64, proposed at Asiacrypt 2015. Our analysis shows that Midori64 has a class of 232 weak keys. Under any such key, the cipher can be distinguished with only a single chosen query, and
Externí odkaz:
https://doaj.org/article/db4aa9cbddee4f08aa0aa9e6f8937644
Autor:
Jérémy Jean
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 1-12 (2016)
In this paper, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 216 function evalu
Externí odkaz:
https://doaj.org/article/5e3e1f15fea94bb38ca33db8bf5d7ab2
Publikováno v:
Journal of Cryptology. 34
We present the Deoxys family of authenticated encryption schemes, which consists of Deoxys-I and Deoxys-II. Both are nonce-based authenticated encryption schemes with associated data and have either 128- or 256-bit keys. Deoxys-I is similar to OCB: I
Autor:
Stefan Kölbl, Thomas Peyrin, Amir Moradi, Yu Sasaki, Jérémy Jean, Christof Beierle, Siang Meng Sim, Gregor Leander, Pascal Sasdrich
Publikováno v:
IACR Transactions on Symmetric Cryptology; Volume 2020, Special Issue 1 ; 88-131
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family of tweakable block ciphers, which was presented at CRYPTO 2016, as the underl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::010ff7e8e247ba647d1d9c9aa78f5401