搜索结果: 1-7 共查到“tweakable block cipher”相关记录7条 . 查询时间(0.08 秒)
Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher
Leakage-resilience authenticated encryption leveled implementation
font style='font-size:12px;'>
2019/5/9
This paper presents CONCRETE (Commit-Encrypt-Send-the-Key) a new Authenticated Encryption mode that offers CIML2 security, that is, ciphertext integrity in the presence of nonce misuse and side-channe...
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
tweakable block cipher GIFT AES
font style='font-size:12px;'>
2019/5/5
Tweakable block cipher (TBC), a stronger notion than standard block ciphers, has wide-scale applications in symmetric-key schemes. At a high level, it provides flexibility in design and (possibly) bet...
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks
CRAFT block cipher tweakable
font style='font-size:12px;'>
2019/2/28
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryp...
ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls
n-bit security beyond birthday bound tweakable blockcipher
font style='font-size:12px;'>
2018/11/19
Strong Pseudo-random Permutations (SPRPs) are important for various applications. In general, it is desirable to base an SPRP on a single-keyed primitive for minimizing the implementation costs. For c...
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
message authentication code tweakable block cipher authenticated encryption
font style='font-size:12px;'>
2017/6/8
We propose a new mode of operation called ZMAC allowing to construct a (stateless and deterministic) message authentication code (MAC) from a tweakable block cipher (TBC). When using a TBC with n-bit ...
A Note on the CLRW2 Tweakable Block Cipher Construction
CLRW2 secret-key cryptography
font style='font-size:12px;'>
2016/1/25
In this note, we describe an error in the proof for CLRW2 given by Landecker et al. in
their paper at CRYPTO 2012 on the beyond-birthday-bound security for tweakable block ciphers.
We are able to re...
Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language
Cryptography encryption MSP430
font style='font-size:12px;'>
2015/12/24
The encryption mode of the Tweakable Block Cipher (TBC) of the SCREAM Authenticated Cipher is implemented in the MSP430 microcontroller. Assembly language versions of the TBC are prepared using both p...