Improved differential-linear attacks with applications to ARX ciphers

C Beierle, M Broll, F Canale, N David… - Journal of …, 2022 - Springer
… impact, we apply them to Chaskey and ChaCha and we are … efficiently prevented in most
cases by the XOR of constants. … have at hand nice and efficient formulas for their computation […

Improving the Accuracy of Differential-Neural Distinguisher for DES, Chaskey, and PRESENT

L Zhang, Z Wang, Y Chen - IEICE TRANSACTIONS on Information …, 2023 - search.ieice.org
… Our differential-neural distinguishers are also built for Chaskey reduced to 3, 4 rounds using
a basic training scheme. The parameter (k1, k2, k3) in the initial convolutional layer are (1, 5…

Prototype: User authentication scheme for IoT using NFC

MH Alharbi, OH Alhazmi - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
… In the above algorithm, we notice if the key value at a … Chaskey is an efficient hash function
based on the SipHash that is designed to generate a Message Authentication Code (MAC). …

A bit-vector differential model for the modular addition by a constant

SA Azimi, A Ranea, M Salmasizadeh… - Advances in Cryptology …, 2020 - Springer
algorithms with the most efficient software implementations on low-end microcontrollers [3]. …
the stream cipher Salsa20 [5], the MAC algorithm Chaskey [6] and notable block ciphers like …

The Committing Security of MACs with Applications to Generic Composition

R Bhaumik, B Chakraborty, W Choi, A Dutta… - Cryptology ePrint …, 2024 - eprint.iacr.org
… Badger is around 2−26.12 for 32-bit tag and can be smaller if we … microcontrollers. It can
also be described as CBC-… We show a key-committing attack against Chaskey when messages …

Towards an ultra lightweight block ciphers for Internet of Things

L Sliman, T Omrani, Z Tari, AE Samhat… - Journal of information …, 2021 - Elsevier
algorithms which are based on mathematical functions to hide the content from unauthorized
parties. To make block cipher algorithms … To assess the efficiency of the proposed method, …

BLE Beacon System for Smartphone Secure Tracking

C Hernández-Goya, D Cruz-Rodriguez… - … Computing and Ambient …, 2022 - Springer
… It is based on a pseudo-random generator defined on 32-bit ARX operations. The key is
256 … frame length, it has been replaced by Chaskey [15]. This algorithm is part of the ISO/IEC …

Quantum attacks without superposition queries: the offline Simon's algorithm

X Bonnetain, A Hosoyamada… - … Conference on the …, 2019 - Springer
… that it can be represented efficiently, but in our examples, we … The lightweight MAC Chaskey
[33] is very close to an Even-… The Chaskey round function applies on 128 bits. It contains 16 …

Faster verification of V2X basic safety messages via Message Chaining

EL Cominetti, MVM Silva, MA Simplicio Jr… - Vehicular …, 2023 - Elsevier
… In addition to this modified, VoD-oriented TADS, we assess a similarly efficient mechanism
that … , hash, and MAC algorithms using EdDSA with curve 25519, SHA-256, and Chaskey [40], …

[PDF][PDF] Differential-linear cryptanalysis on Xoodyak

O Dunkelman, A Weizman - NIST Lightweight Cryptography Workshop, 2022 - csrc.nist.rip
… Improved differential-linear cryptanalysis of 7-round chaskey with partitioning. In Advances
in … Chaskey: An efficient MAC algorithm for 32-bit microcontrollers. In Selected Areas in …