Results 1 -
6 of
6
Overview of the Candidates in the CAESAR Competition for Authenticated Encryption
- COMPUTER SCIENCE REVIEW
, 2016
"... The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer advantages over AES-GCM and are suitable for widespread adoption. At the moment, 50 remaining first-round submissions go through an intensive review, analysis and comparison process. While the cryptographic co ..."
Abstract
- Add to MetaCart
The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer advantages over AES-GCM and are suitable for widespread adoption. At the moment, 50 remaining first-round submissions go through an intensive review, analysis and comparison process. While the cryptographic
GMU Hardware API for Authenticated Ciphers
"... Abstract. In this paper, we propose a universal hardware Application Programming Interface (API) for authenticated ciphers. In particular, our API is intended to meet the requirements of all algorithms submit-ted to the CAESAR competition. Two major parts of the API, the inter-face and the communica ..."
Abstract
- Add to MetaCart
Abstract. In this paper, we propose a universal hardware Application Programming Interface (API) for authenticated ciphers. In particular, our API is intended to meet the requirements of all algorithms submit-ted to the CAESAR competition. Two major parts of the API, the inter
BRUTUS: Identifying Cryptanalytic Weaknesses in CAESAR First Round Candidates
"... Abstract. This report summarizes our results from security analysis covering all 57 CAESAR first round candidates and over 210 implementa-tions. We have manually identified security issues with three candidates, two of which are more serious, and these ciphers been withdrawn from the competition. We ..."
Abstract
- Add to MetaCart
Abstract. This report summarizes our results from security analysis covering all 57 CAESAR first round candidates and over 210 implementa-tions. We have manually identified security issues with three candidates, two of which are more serious, and these ciphers been withdrawn from the competition
A practical state recovery attack on the stream cipher Sablier v1?
"... Abstract. Sablier is an authenticated encryption cipher submitted to the CAESAR competition, which is composed of the encryption Sablier v1 and the authentication Au. In this work we present a state recovery attack against the encryption Sablier v1 with time complexity about 244 operations and data ..."
Abstract
- Add to MetaCart
Abstract. Sablier is an authenticated encryption cipher submitted to the CAESAR competition, which is composed of the encryption Sablier v1 and the authentication Au. In this work we present a state recovery attack against the encryption Sablier v1 with time complexity about 244 operations and data
Forgery Attacks on round-reduced ICEPOLE-128
"... Abstract. ICEPOLE is a family of authenticated encryptions schemes submitted to the ongoing CAESAR competition and in addition pre-sented at CHES 2014. To justify the use of ICEPOLE, or to point out po-tential weaknesses, third-party cryptanalysis is needed. In this work, we evaluate the resistance ..."
Abstract
- Add to MetaCart
Abstract. ICEPOLE is a family of authenticated encryptions schemes submitted to the ongoing CAESAR competition and in addition pre-sented at CHES 2014. To justify the use of ICEPOLE, or to point out po-tential weaknesses, third-party cryptanalysis is needed. In this work, we evaluate the resistance
und Computeralgebra (CDC) Algebraic methods in analyzing lightweight cryptographic symmetric primitives
"... Algebraic methods in analyzing ..."