An ultra-high throughput AES-based authenticated encryption scheme for 6G: Design and implementation

R Anand, S Banik, A Caforio, K Fukushima… - … on Research in …, 2023 - Springer
In this paper, we propose Rocca-S, an authenticated encryption scheme with a 256-bit key
and a 256-bit tag targeting 6G applications bootstrapped from AES. Rocca-S achieves an …

Rocca: an efficient AES-based encryption scheme for beyond 5G (full version)

K Sakamoto, F Liu, Y Nakano, S Kiyomoto… - Cryptology ePrint …, 2022 - eprint.iacr.org
In this paper, we present an AES-based authenticated-encryption with associated-data
scheme called Rocca, with the purpose to reach the requirements on the speed and security …

MILP‐based security evaluation for AEGIS/Tiaoxin‐346/Rocca

T Shiraya, N Takeuchi, K Sakamoto… - IET Information …, 2023 - Wiley Online Library
In this paper, the security of Advanced Encryption Standard‐based authenticated encryption
schemes, including AEGIS family, Tiaoxin‐346, and Rocca by mixed integer linear …

Weak-keys and key-recovery attack for

P Dutta, MS Rajasree, S Sarkar - Scientific Reports, 2022 - nature.com
In this paper, we study NIST lightweight 3 rd round candidate TinyJAMBU. The core
component of TinyJAMBU is the keyed permutation P n, which is based on a non-linear …

Single-query quantum hidden shift attacks

X Bonnetain, A Schrottenloher - IACR Transactions on Symmetric …, 2024 - inria.hal.science
Quantum attacks using superposition queries are known to break many classically secure
modes of operation. While these attacks do not necessarily threaten the security of the …

LOL: a highly flexible framework for designing stream ciphers

D Feng, L Jiao, Y Hao, Q Zheng, W Wu, W Qi… - Science China …, 2024 - Springer
In this paper, we propose LOL, a general framework for designing blockwise stream ciphers.
The proposed framework achieves ultrafast software implementations for ubiquitous virtual …

Security evaluation of initialization phases and round functions of rocca and aegis

N Takeuchi, K Sakamoto, T Isobe - IEICE Transactions on …, 2023 - search.ieice.org
Authenticated-Encryption with Associated-Data (AEAD) plays an important role in
guaranteeing confidentiality, integrity, and authenticity in network communications. To meet …

[HTML][HTML] Weak-keys and key-recovery attack for [... formula...]

P Dutta, MS Rajasree, S Sarkar - Scientific Reports, 2022 - ncbi.nlm.nih.gov
In this paper, we study NIST lightweight 3rd round candidate TinyJAMBU. The core
component of TinyJAMBU is the keyed permutation P n, which is based on a non-linear …

Bit-Wise Analysis for Forgery Attacks on AES-Based AEAD Schemes

T Shiraya, K Sakamoto, T Isobe - International Workshop on Security, 2024 - Springer
We examine the security of AES-based authenticated encryption schemes, including the
AEGIS family, Tiaoxin-346, Rocca and Rocca-S. Existing studies evaluated the security …

Superpoly Recovery of Grain-128AEAD Using Division Property

D Chakraborty, S Pal - International Conference on Information …, 2022 - Springer
The cube attack is a powerful cryptanalytic technique against stream ciphers. Cube attacks
exploit the algebraic properties of symmetric ciphers by recovering a particular polynomial …