Zobrazeno 1 - 10
of 50
pro vyhledávání: '"Maria Eichlseder"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 3 (2024)
The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack: searching for the distinguisher and building a key recovery upon it. Previous works only fo
Externí odkaz:
https://doaj.org/article/f44f697d5b6e4b1fbc61b4cd78611701
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 1 (2024)
Integral, impossible-differential (ID), and zero-correlation (ZC) attacks are three of the most important attacks on block ciphers. However, manually finding these attacks can be a daunting task, which is why automated methods are becoming increasing
Externí odkaz:
https://doaj.org/article/3b2a843300c54622917562db7008b7dd
Autor:
Roberto Avanzi, Subhadeep Banik, Orr Dunkelman, Maria Eichlseder, Shibam Ghosh, Marcel Nageler, Francesco Regazzoni
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 3 (2023)
We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA (from FSE 2017) to improve its security bounds and allow for longer tweaks, while keeping similar latency and area. The wider tweak input caters to both specific us
Externí odkaz:
https://doaj.org/article/373b6882be4e464eae05b660c772d14d
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2023, Iss 1 (2023)
The hash function Romulus-H is a finalist in the NIST Lightweight Cryptography competition. It is based on the Hirose double block-length (DBL) construction which is provably secure when used with an ideal block cipher. However, in practice, ideal bl
Externí odkaz:
https://doaj.org/article/e5994d8cc37247688bbf6d60dcb773e8
Publikováno v:
Frontiers in Future Transportation, Vol 3 (2022)
The interest in virtual testing is globally rapidly increasing because of several advantages compared to physical tests in laboratories. In the area of passive car safety, finite element simulations can be used to get further insights, use more biofi
Externí odkaz:
https://doaj.org/article/6ca98764d1e1480aa9be3ac65ff4c764
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 3 (2022)
Automatic tools to search for boomerang distinguishers have seen significant advances over the past few years. However, most previous work has focused on ciphers based on a Substitution Permutation Network (SPN), while analyzing the Feistel structure
Externí odkaz:
https://doaj.org/article/f4df1e6d79a24148a2384400df984bf0
Autor:
Hosein Hadipour, Maria Eichlseder
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 2 (2022)
WARP is a 128-bit block cipher published by Banik et al. at SAC 2020 as a lightweight alternative to AES. It is based on a generalized Feistel network and achieves the smallest area footprint among 128-bit block ciphers in many settings. Previous ana
Externí odkaz:
https://doaj.org/article/b311a899e37540999a10b961ea64d940
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 1 (2022)
The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for constrained devices. One essential criterion for the evaluation of the 10 finalists is the evi
Externí odkaz:
https://doaj.org/article/7aa7286eaf0943d48076f775ced7b7bc
Autor:
Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, Thomas Unterluggauer
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2020, Iss S1 (2020)
We specify Isap v2.0, a lightweight permutation-based authenticated encryption algorithm that is designed to ease protection against side-channel and fault attacks. This design is an improved version of the previously published Isap v1.0, and offers
Externí odkaz:
https://doaj.org/article/3f5cddb660104aee822aec0c5be79e93
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2019, Iss 4 (2020)
AEGIS is one of the authenticated encryption designs selected for the final portfolio of the CAESAR competition. It combines the AES round function and simple Boolean operations to update its large state and extract a keystream to achieve an excellen
Externí odkaz:
https://doaj.org/article/1bff710ce48e4c009ca595989a256518