Skip to main content

and
  1. Chapter and Conference Paper

    Cryptanalysis of ForkAES

    Forkciphers are a new kind of primitive proposed recently by Andreeva et al. for efficient encryption and authentication of small messages. They fork the middle state of a cipher and encrypt it twice under two...

    Subhadeep Banik, Jannis Bossert, Amit Jana in Applied Cryptography and Network Security (2019)

  2. Chapter and Conference Paper

    Gimli : A Cross-Platform Permutation

    This paper presents Gimli, a 384-bit permutation designed to achieve high security with high performance across a broad range of platforms, including 64-bit Intel/AMD server CPUs, 64-bit and 32-bit ARM smartphone...

    Daniel J. Bernstein, Stefan Kölbl in Cryptographic Hardware and Embedded System… (2017)

  3. No Access

    Chapter

    Cryptographic Attack Metrics

    When evaluating systems containing cryptographic components, the question arises how to measure the security provided by the cryptography included in the system. In this chapter we highlight the difficulties i...

    Zinaida Benenson, Ulrich Kühn, Stefan Lucks in Dependability Metrics (2008)

  4. Chapter and Conference Paper

    The Saturation Attack — A Bait for Twofish

    This paper introduces the notion of a “saturation attack”. Consider a permutation p over w-bit words. If p is applied to all 2w disjoint words, the set of outputs is exactly the same as the set of inputs. A satur...

    Stefan Lucks in Fast Software Encryption (2002)

  5. Chapter and Conference Paper

    Bias in the LEVIATHAN Stream Cipher

    We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and proportional effort; both arise from compression within the cipher. The first models the cipher...

    Paul Crowley, Stefan Lucks in Fast Software Encryption (2002)

  6. Chapter and Conference Paper

    Faster Luby-Rackoff ciphers

    This paper deals with a generalization of Luby's and Rackoff's results [9] on the construction of block ciphers and their consequences for block cipher implementations. Based on dedicated hash functions, block...

    Stefan Lucks in Fast Software Encryption (1996)