Format-preserving encryption (FPE) produces ciphertexts which have the same format as the plaintexts. Building secure FPE is very challenging, and recent attacks (Bellare, Hoang, Tessaro, CCS\u2716; Durak and Vaudenay, CRYPTO\u2717) have highlighted security deficiencies in the recent NIST SP800-38G standard. This has left the question open of whether practical schemes with high security exist. In this paper, we continue the investigation of attacks against FPE schemes. Our first contribution are new known-plaintext message recovery attacks against Feistel-based FPEs (such as FF1/FF3 from the NIST SP800-38G standard) which improve upon previous work in terms of amortized complexity in multi-target scenarios, where multiple ciphertexts are...
We introduce an algorithm called Cycle Slicer that gives new solutions to two important problems in ...
Forkciphers are a new kind of primitive proposed recently by Andreeva et al. for efficient encryptio...
Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding...
The National Institute of Standards and Technology (NIST) recently published a Format-Preserving Enc...
The National Institute of Standards and Technology (NIST) recently published a Format-Preserving Enc...
emph{Property-preserving encryption} (PPE) provides accessible methods to encrypt the databases in a...
Feistel Networks (FN) are now being used massively to encrypt credit card numbers through format-pre...
In some encryption systems it is necessary to preserve the format and length of the encrypted data. ...
We introduce identity-based format-preserving encryption (IB-FPE) as a way to localize and limit the...
We propose new generic key recovery attacks on Feistel-type block ciphers. The proposed attack is ba...
International audienceFlexAEAD is a block cipher candidate submitted to the NIST Lightweight Cryptog...
In this paper we give necessary design principles to be used, when constructing secure Feistel ciph...
Abstract. Feistel structures are an extremely important and exten-sively researched type of cryptogr...
The Internet of Things (IoT) is a network of interconnected low-power sensing devices designed to in...
International audienceGeneric distinguishers against Feistel Network with up to 5 rounds exist in th...
We introduce an algorithm called Cycle Slicer that gives new solutions to two important problems in ...
Forkciphers are a new kind of primitive proposed recently by Andreeva et al. for efficient encryptio...
Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding...
The National Institute of Standards and Technology (NIST) recently published a Format-Preserving Enc...
The National Institute of Standards and Technology (NIST) recently published a Format-Preserving Enc...
emph{Property-preserving encryption} (PPE) provides accessible methods to encrypt the databases in a...
Feistel Networks (FN) are now being used massively to encrypt credit card numbers through format-pre...
In some encryption systems it is necessary to preserve the format and length of the encrypted data. ...
We introduce identity-based format-preserving encryption (IB-FPE) as a way to localize and limit the...
We propose new generic key recovery attacks on Feistel-type block ciphers. The proposed attack is ba...
International audienceFlexAEAD is a block cipher candidate submitted to the NIST Lightweight Cryptog...
In this paper we give necessary design principles to be used, when constructing secure Feistel ciph...
Abstract. Feistel structures are an extremely important and exten-sively researched type of cryptogr...
The Internet of Things (IoT) is a network of interconnected low-power sensing devices designed to in...
International audienceGeneric distinguishers against Feistel Network with up to 5 rounds exist in th...
We introduce an algorithm called Cycle Slicer that gives new solutions to two important problems in ...
Forkciphers are a new kind of primitive proposed recently by Andreeva et al. for efficient encryptio...
Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding...