The \texttt{Deoxys} AEAD family
From MaRDI portal
Publication:2044756
DOI10.1007/s00145-021-09397-wzbMath1470.94091OpenAlexW3168518876MaRDI QIDQ2044756
Ivica Nikolić, Thomas Peyrin, Yannick Seurin, Jérémy Jean
Publication date: 10 August 2021
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-021-09397-w
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (5)
Truncated boomerang attacks and application to AES-based ciphers ⋮ Overloading the nonce: rugged PRPs, nonce-set AEAD, and order-resilient channels ⋮ INT-RUP security of \textsf{SAEB} and \textsf{TinyJAMBU} ⋮ Offset-based BBB-secure tweakable block-ciphers with updatable caches ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Tweakable block ciphers
- Boomerang Connectivity Table: a new cryptanalysis tool
- Improved related-tweakey boomerang attacks on Deoxys-BC
- ZMAC: a fast tweakable block cipher mode for highly secure message authentication
- How to use metaheuristics for design of symmetric-key primitives
- Looting the LUTs: FPGA optimization of AES and AES-like ciphers for authenticated encryption
- The resistance of PRESENT-80 against related-key differential attacks
- Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
- Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128
- Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware
- Faster Chosen-Key Distinguishers on Reduced-Round AES
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- How to Securely Release Unverified Plaintext in Authenticated Encryption
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- ALE: AES-Based Lightweight Authenticated Encryption
- Cryptanalysis of FIDES
- Robust Authenticated-Encryption AEZ and the Problem That It Solves
- The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE
- Search for Related-Key Differential Characteristics in DES-Like Ciphers
- The Software Performance of Authenticated-Encryption Modes
- Improved Single-Key Attacks on 8-Round AES-192 and AES-256
- Distinguisher and Related-Key Attack on the Full AES-256
- A Meet-in-the-Middle Attack on 8-Round AES
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others
- Rotational Cryptanalysis of ARX
- Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
- Improved Differential Attacks for ECHO and Grøstl
- A Provable-Security Treatment of the Key-Wrap Problem
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Improved Rebound Attack on the Finalist Grøstl
- McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
- Reconsidering Generic Composition
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Progress in Cryptology - INDOCRYPT 2004
- Fast Software Encryption
This page was built for publication: The \texttt{Deoxys} AEAD family