搜索结果: 1-4 共查到“TWEAKEY”相关记录4条 . 查询时间(0.046 秒)
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Symmetric-key cryptography tweakable block ciphers zero-correlation
2019/3/1
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights. For instance, results of Kranz, Leander, ...
Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256
related-tweakey impossible dierential attack tweakable block cipher Deoxys-BC-256
2018/7/17
Deoxys-BC is the internal tweakable block cipher of Deoxys, a third-round authenticated encryption candidate at the CAESAR competition. In this study, by adequately studying the tweakey schedule, we s...
Security Analysis of SKINNY under Related-Tweakey Settings
Block cipher SKINNY Impossible Differential Attack
2016/12/7
In CRYPTO'16, a new family of tweakable lightweight block ciphers - SKINNY was introduced. Denoting the variants of SKINNY as SKINNY-nn-tt, where nn represents the block size and tt represents the twe...
We propose the TWEAKEY framework with goal to unify the design of tweakable block ciphers
and of block ciphers resistant to related-key attacks. Our framework is simple, extends the key-alternating
...