NORX is one of the fifteen authenticated encryption algorithms that have reached the third round of the CAESAR competition. NORX is built using the sponge-based Monkey Duplex construction. In this note we analyze the core permutation F. We show that it has rotational symmetries on different structure levels. This yields simple distinguishing properties for the permutation, which propagate with very high probability or even probability one. We also investigate differential symmetries in NORX at the word level. A new type of truncated differentials called symmetric truncated differentials (STD) is proposed. It is shown that, under the Markov assumption, up to 2.125 rounds of the F function of NORX32 and NORX64 can be distinguished using STD. ...
© International Association for Cryptologic Research 2014. The Sponge function is known to achieve ...
MORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR competition, ...
We consider highly structured truncated differential paths to mount rebound attacks on hash function...
NORX is one of the fifteen authenticated encryption algorithms that have reached the third round of ...
NORX is one of the fifteen authenticated encryption algorithms that have reached the third round of ...
NORX is a permutation-based authentication scheme which is currently a third-round candidate of the ...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
This paper presents NORX8 and NORX16, the 8-bit and 16-bit versions of the authenticated cipher NORX...
Nowadays, cryptology is heavily used to protect stored and transmitted data against malicious attack...
Nowadays, cryptology is heavily used to protect stored and transmitted data against malicious attack...
Nowadays, cryptology is heavily used to protect stored and transmitted data against malicious attack...
International audienceA new distinguishing property against block ciphers, called the division prope...
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) s...
© International Association for Cryptologic Research 2014. The Sponge function is known to achieve ...
MORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR competition, ...
We consider highly structured truncated differential paths to mount rebound attacks on hash function...
NORX is one of the fifteen authenticated encryption algorithms that have reached the third round of ...
NORX is one of the fifteen authenticated encryption algorithms that have reached the third round of ...
NORX is a permutation-based authentication scheme which is currently a third-round candidate of the ...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
International audienceNORX is an authenticated encryption scheme with associated data that was selec...
This paper presents NORX8 and NORX16, the 8-bit and 16-bit versions of the authenticated cipher NORX...
Nowadays, cryptology is heavily used to protect stored and transmitted data against malicious attack...
Nowadays, cryptology is heavily used to protect stored and transmitted data against malicious attack...
Nowadays, cryptology is heavily used to protect stored and transmitted data against malicious attack...
International audienceA new distinguishing property against block ciphers, called the division prope...
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) s...
© International Association for Cryptologic Research 2014. The Sponge function is known to achieve ...
MORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR competition, ...
We consider highly structured truncated differential paths to mount rebound attacks on hash function...