An ultra-high throughput AES-based authenticated encryption scheme for 6G: Design and implementation
R Anand, S Banik, A Caforio, K Fukushima… - … on Research in …, 2023 - Springer
In this paper, we propose Rocca-S, an authenticated encryption scheme with a 256-bit key
and a 256-bit tag targeting 6G applications bootstrapped from AES. Rocca-S achieves an …
and a 256-bit tag targeting 6G applications bootstrapped from AES. Rocca-S achieves an …
Improved guess-and-determine and distinguishing attacks on SNOW-V
J Yang, T Johansson, A Maximov - Cryptology ePrint Archive, 2021 - eprint.iacr.org
In this paper, we investigate the security of SNOW-V, demonstrating two guess-and-
determine (GnD) attacks against the full version with complexities $2^{384} $ and $2^{378} …
determine (GnD) attacks against the full version with complexities $2^{384} $ and $2^{378} …
Correlation attacks on SNOW-V-like stream ciphers based on a heuristic MILP model
S Ma, C Jin, Z Shi, T Cui, J Guan - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
SNOW-V and SNOW-Vi are two new LFSR-based stream ciphers of the SNOW family
designed for the 5G mobile communication system. Correlation attack is a well-known …
designed for the 5G mobile communication system. Correlation attack is a well-known …
Weak keys in reduced AEGIS and tiaoxin
Abstract AEGIS-128 and Tiaoxin-346 (Tiaoxin for short) are two AES-based primitives
submitted to the CAESAR competition. Among them, AEGIS-128 has been selected in the …
submitted to the CAESAR competition. Among them, AEGIS-128 has been selected in the …
Rocca: an efficient AES-based encryption scheme for beyond 5G (full version)
In this paper, we present an AES-based authenticated-encryption with associated-data
scheme called Rocca, with the purpose to reach the requirements on the speed and security …
scheme called Rocca, with the purpose to reach the requirements on the speed and security …
Single-query quantum hidden shift attacks
X Bonnetain, A Schrottenloher - IACR Transactions on Symmetric …, 2024 - inria.hal.science
Quantum attacks using superposition queries are known to break many classically secure
modes of operation. While these attacks do not necessarily threaten the security of the …
modes of operation. While these attacks do not necessarily threaten the security of the …
Efficient methods to search for best differential characteristics on SKINNY
Evaluating resistance of ciphers against differential cryptanalysis is essential to define the
number of rounds of new designs and to mount attacks derived from differential …
number of rounds of new designs and to mount attacks derived from differential …
(Quantum) collision attacks on reduced simpira v2
B Ni, X Dong, K Jia, Q You - IACR Transactions on Symmetric …, 2021 - tosc.iacr.org
Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT
2016. In this paper, we build an improved MILP model to count the differential and linear …
2016. In this paper, we build an improved MILP model to count the differential and linear …
COLM under attack: A cryptanalytic exploration of COLM variants
D Chakraborty, M Nandi - Journal of Information Security and Applications, 2025 - Elsevier
Abstract Authenticated Encryption with Associated Data (AEAD) schemes have become a
powerful solution for addressing contemporary security challenges. Within the recipients of …
powerful solution for addressing contemporary security challenges. Within the recipients of …
LOL: a highly flexible framework for designing stream ciphers
D Feng, L Jiao, Y Hao, Q Zheng, W Wu, W Qi… - Science China …, 2024 - Springer
In this paper, we propose LOL, a general framework for designing blockwise stream ciphers.
The proposed framework achieves ultrafast software implementations for ubiquitous virtual …
The proposed framework achieves ultrafast software implementations for ubiquitous virtual …