{Adiantum}: length-preserving encryption for entry-level processors
P Crowley, E Biggers - Cryptology ePrint Archive, 2018 - eprint.iacr.org
We present HBSH, a simple construction for tweakable length-preserving encryption which
supports the fastest options for hashing and stream encryption for processors without AES or …
supports the fastest options for hashing and stream encryption for processors without AES or …
[BOOK][B] Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore …
M Tibouchi, H Wang - 2021 - books.google.com
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the
proceedings of the 27th International Conference on the Theory and Application of …
proceedings of the 27th International Conference on the Theory and Application of …
Breaking, Repairing and Enhancing XCBv2 into the Tweakable Enciphering Mode GEM
Tweakable enciphering modes (TEMs) provide security in a variety of storage and space-
critical applications like disk and file-based encryption, and packet-based communication …
critical applications like disk and file-based encryption, and packet-based communication …
Efficient Instances of Docked Double Decker With AES, and Application to Authenticated Encryption
A tweakable wide blockcipher is a construction which behaves in the same way as a
tweakable blockcipher, with the difference that the actual block size is flexible. Due to this …
tweakable blockcipher, with the difference that the actual block size is flexible. Due to this …
Deck-based wide block cipher modes and an exposition of the blinded keyed hashing model
A Gunsing, J Daemen… - IACR Transactions on …, 2019 - philosophymindscience.org
We present two tweakable wide block cipher modes from doubly-extendable cryptographic
keyed (deck) functions and a keyed hash function: double-decker and docked-double …
keyed (deck) functions and a keyed hash function: double-decker and docked-double …
Length-preserving encryption with HCTR2
P Crowley, N Huckleberry, E Biggers - Cryptology ePrint Archive, 2021 - eprint.iacr.org
On modern processors HCTR is one of the most efficient constructions for building a
tweakable super-pseudorandom permutation. However, a bug in the specification and …
tweakable super-pseudorandom permutation. However, a bug in the specification and …
Mystrium: Wide Block Encryption Efficient on Entry-Level Processors
We present a tweakable wide block cipher called Mystrium and show it as the fastest such
primitive on low-end processors that lack dedicated AES or other cryptographic instructions …
primitive on low-end processors that lack dedicated AES or other cryptographic instructions …
Breaking tweakable enciphering schemes using Simon's algorithm
We show the applicability of Simon's period finding quantum algorithm to the cryptanalysis of
several tweakable enciphering schemes (TESs), namely, CMC, EME, XCB, TET and FAST …
several tweakable enciphering schemes (TESs), namely, CMC, EME, XCB, TET and FAST …
FAST: secure and high performance format-preserving encryption and tokenization
We propose a new construction for format-preserving encryption. Our design provides the
flexibility for use in format-preserving encryption (FPE) and for static table-driven …
flexibility for use in format-preserving encryption (FPE) and for static table-driven …
Fast Low Level Disk Encryption Using FPGAs
A fixed length tweakable enciphering scheme (TES) is the appropriate cryptographic
functionality for low level disk encryption. Research on TES over the last two decades have …
functionality for low level disk encryption. Research on TES over the last two decades have …