Improving attacks on round-reduced speck32/64 using deep learning

A Gohr - Advances in Cryptology–CRYPTO 2019: 39th Annual …, 2019 - Springer
This paper has four main contributions. First, we calculate the predicted difference
distribution of Speck32/64 with one specific input difference under the Markov assumption …

LEA: A 128-bit block cipher for fast encryption on common processors

D Hong, JK Lee, DC Kim, D Kwon, KH Ryu… - … Workshop, WISA 2013 …, 2014 - Springer
We propose a new block cipher LEA, which has 128-bit block size and 128, 192, or 256-bit
key size. It provides a high-speed software encryption on general-purpose processors. Our …

[HTML][HTML] A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations

M Alawida, JS Teh, A Mehmood, A Shoufan - Journal of King Saud …, 2022 - Elsevier
Over the years, there has been considerable interest in the area of chaos-based encryption
due to the fact that cryptographic algorithms and chaotic maps share a wide-range of similar …

Chaskey: an efficient MAC algorithm for 32-bit microcontrollers

N Mouha, B Mennink, A Van Herrewege… - Selected Areas in …, 2014 - Springer
We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …

MILP-based automatic search algorithms for differential and linear trails for speck

K Fu, M Wang, Y Guo, S Sun, L Hu - … March 20-23, 2016, Revised Selected …, 2016 - Springer
Abstract In recent years, Mixed Integer Linear Programming (MILP) has been successfully
applied in searching for differential characteristics and linear approximations in block …

The software performance of authenticated-encryption modes

T Krovetz, P Rogaway - … : 18th International Workshop, FSE 2011, Lyngby …, 2011 - Springer
We study software performance of authenticated-encryption modes CCM, GCM, and OCB.
Across a variety of platforms, we find OCB to be substantially faster than either alternative …

Design Strategies for ARX with Provable Bounds: Sparx and LAX

D Dinu, L Perrin, A Udovenko, V Velichkov… - Advances in Cryptology …, 2016 - Springer
We present, for the first time, a general strategy for designing ARX symmetric-key primitives
with provable resistance against single-trail differential and linear cryptanalysis. The latter …

[PDF][PDF] The skein hash function family

N Ferguson, S Lucks, B Schneier, D Whiting… - Submission to NIST …, 2010 - schneier.com
Skein is a new family of cryptographic hash functions. Its design combines speed, security,
simplicity, and a great deal of flexibility in a modular package that is easy to analyze. Skein …

Differential Cryptanalysis of Round-Reduced Simon and Speck

F Abed, E List, S Lucks, J Wenzel - … , FSE 2014, London, UK, March 3-5 …, 2015 - Springer
This paper presents differential attacks on Simon and Speck, two families of lightweight
block ciphers that were presented by the US National Security Agency in June 2013. We …