Improved differential-linear attacks with applications to ARX ciphers
C Beierle, M Broll, F Canale, N David… - Journal of …, 2022 - Springer
… impact, we apply them to Chaskey and ChaCha and we are … efficiently prevented in most
cases by the XOR of constants. … have at hand nice and efficient formulas for their computation […
cases by the XOR of constants. … have at hand nice and efficient formulas for their computation […
Improving the Accuracy of Differential-Neural Distinguisher for DES, Chaskey, and PRESENT
… Our differential-neural distinguishers are also built for Chaskey reduced to 3, 4 rounds using
a basic training scheme. The parameter (k1, k2, k3) in the initial convolutional layer are (1, 5…
a basic training scheme. The parameter (k1, k2, k3) in the initial convolutional layer are (1, 5…
Prototype: User authentication scheme for IoT using NFC
MH Alharbi, OH Alhazmi - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
… In the above algorithm, we notice if the key value at a … Chaskey is an efficient hash function
based on the SipHash that is designed to generate a Message Authentication Code (MAC). …
based on the SipHash that is designed to generate a Message Authentication Code (MAC). …
A bit-vector differential model for the modular addition by a constant
SA Azimi, A Ranea, M Salmasizadeh… - Advances in Cryptology …, 2020 - Springer
… algorithms with the most efficient software implementations on low-end microcontrollers [3]. …
the stream cipher Salsa20 [5], the MAC algorithm Chaskey [6] and notable block ciphers like …
the stream cipher Salsa20 [5], the MAC algorithm Chaskey [6] and notable block ciphers like …
The Committing Security of MACs with Applications to Generic Composition
… Badger is around 2−26.12 for 32-bit tag and can be smaller if we … microcontrollers. It can
also be described as CBC-… We show a key-committing attack against Chaskey when messages …
also be described as CBC-… We show a key-committing attack against Chaskey when messages …
Towards an ultra lightweight block ciphers for Internet of Things
… algorithms which are based on mathematical functions to hide the content from unauthorized
parties. To make block cipher algorithms … To assess the efficiency of the proposed method, …
parties. To make block cipher algorithms … To assess the efficiency of the proposed method, …
BLE Beacon System for Smartphone Secure Tracking
C Hernández-Goya, D Cruz-Rodriguez… - … Computing and Ambient …, 2022 - Springer
… It is based on a pseudo-random generator defined on 32-bit ARX operations. The key is
256 … frame length, it has been replaced by Chaskey [15]. This algorithm is part of the ISO/IEC …
256 … frame length, it has been replaced by Chaskey [15]. This algorithm is part of the ISO/IEC …
Quantum attacks without superposition queries: the offline Simon's algorithm
X Bonnetain, A Hosoyamada… - … Conference on the …, 2019 - Springer
… that it can be represented efficiently, but in our examples, we … The lightweight MAC Chaskey
[33] is very close to an Even-… The Chaskey round function applies on 128 bits. It contains 16 …
[33] is very close to an Even-… The Chaskey round function applies on 128 bits. It contains 16 …
Faster verification of V2X basic safety messages via Message Chaining
… In addition to this modified, VoD-oriented TADS, we assess a similarly efficient mechanism
that … , hash, and MAC algorithms using EdDSA with curve 25519, SHA-256, and Chaskey [40], …
that … , hash, and MAC algorithms using EdDSA with curve 25519, SHA-256, and Chaskey [40], …
[PDF][PDF] Differential-linear cryptanalysis on Xoodyak
O Dunkelman, A Weizman - NIST Lightweight Cryptography Workshop, 2022 - csrc.nist.rip
… Improved differential-linear cryptanalysis of 7-round chaskey with partitioning. In Advances
in … Chaskey: An efficient MAC algorithm for 32-bit microcontrollers. In Selected Areas in …
in … Chaskey: An efficient MAC algorithm for 32-bit microcontrollers. In Selected Areas in …