An ultra-high throughput AES-based authenticated encryption scheme for 6G: Design and implementation
R Anand, S Banik, A Caforio, K Fukushima… - … on Research in …, 2023 - Springer
In this paper, we propose Rocca-S, an authenticated encryption scheme with a 256-bit key
and a 256-bit tag targeting 6G applications bootstrapped from AES. Rocca-S achieves an …
and a 256-bit tag targeting 6G applications bootstrapped from AES. Rocca-S achieves an …
Rocca: an efficient AES-based encryption scheme for beyond 5G (full version)
In this paper, we present an AES-based authenticated-encryption with associated-data
scheme called Rocca, with the purpose to reach the requirements on the speed and security …
scheme called Rocca, with the purpose to reach the requirements on the speed and security …
MILP‐based security evaluation for AEGIS/Tiaoxin‐346/Rocca
T Shiraya, N Takeuchi, K Sakamoto… - IET Information …, 2023 - Wiley Online Library
In this paper, the security of Advanced Encryption Standard‐based authenticated encryption
schemes, including AEGIS family, Tiaoxin‐346, and Rocca by mixed integer linear …
schemes, including AEGIS family, Tiaoxin‐346, and Rocca by mixed integer linear …
Weak-keys and key-recovery attack for
In this paper, we study NIST lightweight 3 rd round candidate TinyJAMBU. The core
component of TinyJAMBU is the keyed permutation P n, which is based on a non-linear …
component of TinyJAMBU is the keyed permutation P n, which is based on a non-linear …
Single-query quantum hidden shift attacks
X Bonnetain, A Schrottenloher - IACR Transactions on Symmetric …, 2024 - inria.hal.science
Quantum attacks using superposition queries are known to break many classically secure
modes of operation. While these attacks do not necessarily threaten the security of the …
modes of operation. While these attacks do not necessarily threaten the security of the …
LOL: a highly flexible framework for designing stream ciphers
D Feng, L Jiao, Y Hao, Q Zheng, W Wu, W Qi… - Science China …, 2024 - Springer
In this paper, we propose LOL, a general framework for designing blockwise stream ciphers.
The proposed framework achieves ultrafast software implementations for ubiquitous virtual …
The proposed framework achieves ultrafast software implementations for ubiquitous virtual …
Security evaluation of initialization phases and round functions of rocca and aegis
N Takeuchi, K Sakamoto, T Isobe - IEICE Transactions on …, 2023 - search.ieice.org
Authenticated-Encryption with Associated-Data (AEAD) plays an important role in
guaranteeing confidentiality, integrity, and authenticity in network communications. To meet …
guaranteeing confidentiality, integrity, and authenticity in network communications. To meet …
[HTML][HTML] Weak-keys and key-recovery attack for [... formula...]
In this paper, we study NIST lightweight 3rd round candidate TinyJAMBU. The core
component of TinyJAMBU is the keyed permutation P n, which is based on a non-linear …
component of TinyJAMBU is the keyed permutation P n, which is based on a non-linear …
Bit-Wise Analysis for Forgery Attacks on AES-Based AEAD Schemes
T Shiraya, K Sakamoto, T Isobe - International Workshop on Security, 2024 - Springer
We examine the security of AES-based authenticated encryption schemes, including the
AEGIS family, Tiaoxin-346, Rocca and Rocca-S. Existing studies evaluated the security …
AEGIS family, Tiaoxin-346, Rocca and Rocca-S. Existing studies evaluated the security …
Superpoly Recovery of Grain-128AEAD Using Division Property
D Chakraborty, S Pal - International Conference on Information …, 2022 - Springer
The cube attack is a powerful cryptanalytic technique against stream ciphers. Cube attacks
exploit the algebraic properties of symmetric ciphers by recovering a particular polynomial …
exploit the algebraic properties of symmetric ciphers by recovering a particular polynomial …