<i>π-Cipher</i> is one of the twenty-nine candidates in the second round of the <i>CAESAR</i> competition for authenticated ciphers. <i>π-Cipher</i> uses a parallel sponge construction, based upon an <i>ARX</i> permutation. This work shows several state recovery attacks, on up to three rounds. These attacks use known values in the function's bitrate, combined with values found through exhaustive search, to retrieve the remaining values in the internal state. These attacks can break one round, for any variant of <i>π-Cipher</i>, in negligible time. They can also break two or three rounds much faster than exhaustive search on the key, for some variants. However, these attacks only work against version 1 of <i>π-Cipher</i>, due to the differen...
Abstract. Sablier is an authenticated encryption cipher submitted to the CAESAR competition, which i...
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook...
\u3cp\u3eMORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR comp...
π-Cipher is one of the twenty-nine candidates in the second round of the CAESAR competition for auth...
International audienceIn this paper, we propose a guess and determine attack against some variants o...
International audienceIn this paper, we propose a guess and determine attack against some variants o...
International audienceIn this paper, we propose a guess and determine attack against some variants o...
Authenticated ciphers rely on the uniqueness of the nonces to meet their security goals. In this wor...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
Free to read on publisher website We investigate six authenticated encryption schemes (ACORN, ASCON-...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
Abstract. In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offse...
Abstract. Sablier is an authenticated encryption cipher submitted to the CAESAR competition, which i...
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook...
\u3cp\u3eMORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR comp...
π-Cipher is one of the twenty-nine candidates in the second round of the CAESAR competition for auth...
International audienceIn this paper, we propose a guess and determine attack against some variants o...
International audienceIn this paper, we propose a guess and determine attack against some variants o...
International audienceIn this paper, we propose a guess and determine attack against some variants o...
Authenticated ciphers rely on the uniqueness of the nonces to meet their security goals. In this wor...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
Free to read on publisher website We investigate six authenticated encryption schemes (ACORN, ASCON-...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
Abstract. In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offse...
Abstract. Sablier is an authenticated encryption cipher submitted to the CAESAR competition, which i...
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook...
\u3cp\u3eMORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR comp...