We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 579 results
  1. Universal tweakable Even-Mansour cipher and its applications

    The construction of the tweakable Even-Mansour cipher is in fact the designs of permutations, mask operations, and masking functions. For...

    Article 05 December 2022
  2. Collision-Resistant and Pseudorandom Hash Function Using Tweakable Block Cipher

    This paper presents a method to construct a keyed Merkle-Damgård hash function satisfying collision resistance and the pseudorandom function property...
    Conference paper 2023
  3. Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher

    Message franking is a feature of end-to-end encrypted messaging introduced by Facebook that enables users to report abusive contents in a verifiable...
    Shoichi Hirose, Kazuhiko Minematsu in Selected Areas in Cryptography – SAC 2023
    Conference paper 2024
  4. Post-quantum Security of Tweakable Even-Mansour, and Applications

    The tweakable Even-Mansour construction yields a tweakable block cipher from a public random permutation. We prove post-quantum security of tweakable...
    Gorjan Alagic, Chen Bai, ... Patrick Struck in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  5. Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher

    Tweakable block cipher (TBC), a stronger notion than standard block ciphers, has wide-scale applications in symmetric-key schemes. At a high level,...
    Avik Chakraborti, Nilanjan Datta, ... Yu Sasaki in Progress in Cryptology – INDOCRYPT 2021
    Conference paper 2021
  6. Offset-Based BBB-Secure Tweakable Block-ciphers with Updatable Caches

    A nonce-respecting tweakable blockcipher is the building-block for the OCB authenticated encryption mode. An XEX-based TBC is used to process each...
    Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi in Progress in Cryptology – INDOCRYPT 2022
    Conference paper 2022
  7. Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom Function

    Many modes of operations for block ciphers or tweakable block ciphers do not require invertibility from their underlying primitive. In this work, we...
    Elena Andreeva, Benoît Cogliati, ... Arnab Roy in Applied Cryptography and Network Security
    Conference paper 2024
  8. Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher

    Recent work of Bao et al. (in: Canteaut and Ishai (eds) EUROCRYPT 2020, Part II. LNCS. Springer, Heidelberg 2020) repopularized tweakable...

    Zhongliang Zhang, Zhen Qin, Chun Guo in Designs, Codes and Cryptography
    Article 27 October 2022
  9. RAMus- A New Lightweight Block Cipher for RAM Encryption

    Over the past decades, there has been a dramatic increase of the attacks recovering the data from the RAM memory. These have heightened the need for...
    Raluca Posteuca, Vincent Rijmen in Security and Cryptography for Networks
    Conference paper 2022
  10. LLLWBC: A New Low-Latency Light-Weight Block Cipher

    Lightweight cipher suitable for resource constrained environment is crucial to the security of applications such as RFID, Internet of Things, etc....
    Lei Zhang, Ruichen Wu, ... Wenling Wu in Information Security and Cryptology
    Conference paper 2023
  11. More About Block Ciphers

    A block cipher is much more than just an encryption algorithm. It can be used as a versatile building block with which a diverse set of cryptographic...
    Christof Paar, Jan Pelzl, Tim Güneysu in Understanding Cryptography
    Chapter 2024
  12. Tweakable Block Mode of Operation for Disk Encompression Using Cipher Text Stealing

    In this paper, we study a particular class of symmetric algorithms that aim to ensure confidentiality by using a functionality that is tweakable...
    Rashmita Padhi, B. N. B. Ray in Digital Democracy – IT for Change
    Conference paper 2021
  13. The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation

    We prove the tight multi-user (mu) security of the (tweakable) key alternating cipher (KAC) for any round r with a single permutation and r-wise...
    Yusuke Naito, Yu Sasaki, Takeshi Sugawara in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  14. ZLR: a fast online authenticated encryption scheme achieving full security

    Online authenticated encryption has been considered of practical relevance in light-weight environments due to low latency and constant memory usage....

    Wonseok Choi, Seongha Hwang, ... Jooyoung Lee in Designs, Codes and Cryptography
    Article Open access 30 May 2024
  15. Towards Minimizing Tweakable Blockcipher-Based Generalized Feistel Networks

    A generalized Feistel network (GFN) is a classical approach to constructing a blockcipher from pseudorandom functions (PRFs). Recently, Nakaya and...
    Conference paper 2024
  16. Multi-user security of the tweakable Even-Mansour cipher

    ** Zhang, Qian Yuan, ... Peng Wang in Science China Information Sciences
    Article 03 December 2020
  17. On improved security bounds of one block ciphers mode of operation for protection of block-oriented system storage devices

    In the end of 2022 in Russian Federation recommendations for standardization were adopted defining a block ciphers mode of operation for...

    Georgii Firsov, Alisa Koreneva in Journal of Computer Virology and Hacking Techniques
    Article 03 June 2024
  18. Pholkos – Efficient Large-State Tweakable Block Ciphers from the AES Round Function

    This paper proposes Pholkos, a family of heavyweight tweakable block ciphers with state and key sizes of...
    Jannis Bossert, Eik List, ... Sebastian Schmitz in Topics in Cryptology – CT-RSA 2022
    Conference paper 2022
  19. FUTURE: A Lightweight Block Cipher Using an Optimal Diffusion Matrix

    In this work, we present FUTURE, a new 64-bit lightweight SPN-based block cipher. FUTURE encrypts data in a single clock cycle with a very low...
    Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta in Progress in Cryptology - AFRICACRYPT 2022
    Conference paper 2022
  20. A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs

    Incompressibility is one of the most fundamental security goals in white-box cryptography. Given recent advances in the design of efficient and...
    Akinori Hosoyamada, Takanori Isobe, ... Kan Yasuda in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
Did you find what you were looking for? Share feedback.