• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 6 of 6

Overview of the Candidates in the CAESAR Competition for Authenticated Encryption

by Farzaneh Abed, Christian Forler, Stefan Lucks - COMPUTER SCIENCE REVIEW , 2016
"... The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer advantages over AES-GCM and are suitable for widespread adoption. At the moment, 50 remaining first-round submissions go through an intensive review, analysis and comparison process. While the cryptographic co ..."
Abstract - Add to MetaCart
The ongoing CAESAR competition aims at finding authenticated encryption schemes that offer advantages over AES-GCM and are suitable for widespread adoption. At the moment, 50 remaining first-round submissions go through an intensive review, analysis and comparison process. While the cryptographic

GMU Hardware API for Authenticated Ciphers

by Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahm, Malik Umar Sharif, Kris Gaj
"... Abstract. In this paper, we propose a universal hardware Application Programming Interface (API) for authenticated ciphers. In particular, our API is intended to meet the requirements of all algorithms submit-ted to the CAESAR competition. Two major parts of the API, the inter-face and the communica ..."
Abstract - Add to MetaCart
Abstract. In this paper, we propose a universal hardware Application Programming Interface (API) for authenticated ciphers. In particular, our API is intended to meet the requirements of all algorithms submit-ted to the CAESAR competition. Two major parts of the API, the inter

BRUTUS: Identifying Cryptanalytic Weaknesses in CAESAR First Round Candidates

by Markku-juhani O. Saarinen
"... Abstract. This report summarizes our results from security analysis covering all 57 CAESAR first round candidates and over 210 implementa-tions. We have manually identified security issues with three candidates, two of which are more serious, and these ciphers been withdrawn from the competition. We ..."
Abstract - Add to MetaCart
Abstract. This report summarizes our results from security analysis covering all 57 CAESAR first round candidates and over 210 implementa-tions. We have manually identified security issues with three candidates, two of which are more serious, and these ciphers been withdrawn from the competition

A practical state recovery attack on the stream cipher Sablier v1?

by Xiutao Feng, Fan Zhang
"... Abstract. Sablier is an authenticated encryption cipher submitted to the CAESAR competition, which is composed of the encryption Sablier v1 and the authentication Au. In this work we present a state recovery attack against the encryption Sablier v1 with time complexity about 244 operations and data ..."
Abstract - Add to MetaCart
Abstract. Sablier is an authenticated encryption cipher submitted to the CAESAR competition, which is composed of the encryption Sablier v1 and the authentication Au. In this work we present a state recovery attack against the encryption Sablier v1 with time complexity about 244 operations and data

Forgery Attacks on round-reduced ICEPOLE-128

by Christoph Dobraunig, Maria Eichlseder, Florian Mendel
"... Abstract. ICEPOLE is a family of authenticated encryptions schemes submitted to the ongoing CAESAR competition and in addition pre-sented at CHES 2014. To justify the use of ICEPOLE, or to point out po-tential weaknesses, third-party cryptanalysis is needed. In this work, we evaluate the resistance ..."
Abstract - Add to MetaCart
Abstract. ICEPOLE is a family of authenticated encryptions schemes submitted to the ongoing CAESAR competition and in addition pre-sented at CHES 2014. To justify the use of ICEPOLE, or to point out po-tential weaknesses, third-party cryptanalysis is needed. In this work, we evaluate the resistance

und Computeralgebra (CDC) Algebraic methods in analyzing lightweight cryptographic symmetric primitives

by Theoretische Informatik Kryptographie, Michael Walter, Prof Johannes, A. Buchmann, Dr. Stanislav Bulygin, Tag Der Einreichung Acknowledgement, Dr. Stanislav Bulygin, Prof Johannes Buchmann
"... Algebraic methods in analyzing ..."
Abstract - Add to MetaCart
Algebraic methods in analyzing
Results 1 - 6 of 6
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University