HALFLOOP-24 is a tweakable block cipher that is used to protect automatic link establishment messages in high frequency radio, a technology commonly used by government agencies and industries that need highly robust long-distance communications. We present the first public cryptanalysis of HALFLOOP-24 and show that HALFLOOP-24, despite its key size of 128 bits, is far from providing 128 bit security. More precisely, we give attacks for ciphertext-only, known-plaintext, chosen-plaintext and chosen-ciphertext scenarios. In terms of their complexities, most of them can be considered practical. However, in the real world, the amount of available data is too low for our attacks to work. Our strongest attack, a boomerang key-recovery, finds the f...
Design and analysis of lightweight block ciphers have become more popular due to the fact that the f...
lvjiqiang AT hotmail.com Abstract. HIGHT is a 32-round block cipher with a 64-bit block size and a 1...
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, ...
HALFLOOP-24 is a tweakable block cipher that is used to protect automatic link establishment message...
HALFLOOP is a family of tweakable block ciphers that are used for encrypting automatic link establis...
HALFLOOP-24 is a cipher specified in MIL-STD-188-141 and used for encrypting Automatic Link Etablish...
HALFLOOP-96 is a 96-bit tweakable block cipher used in high frequency radio to secure automatic link...
QTL is an ultra-lightweight block cipher designed for extremely constrained devices. The cipher has ...
KeeLoq is a lightweight block cipher with a 32-bit block size and a 64-bit key. Despite its short ke...
In this paper we analyze the recently proposed lightweight block cipher PRINTCipher. Applying alg...
Abstract. KeeLoq is a lightweight block cipher with a 32-bit block size and a 64-bit key. Despite it...
Abstract. This paper investigates the practical security of RC4 in broad-cast setting where the same...
The SoDark cipher is used to protect transmitted frames in the second and third generation automatic...
International audienceLBlock is a new lightweight block cipher proposed by Wu and Zhang (2011) [12] ...
International audiencePervasive devices are usually deployed in hostile environments where they are ...
Design and analysis of lightweight block ciphers have become more popular due to the fact that the f...
lvjiqiang AT hotmail.com Abstract. HIGHT is a 32-round block cipher with a 64-bit block size and a 1...
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, ...
HALFLOOP-24 is a tweakable block cipher that is used to protect automatic link establishment message...
HALFLOOP is a family of tweakable block ciphers that are used for encrypting automatic link establis...
HALFLOOP-24 is a cipher specified in MIL-STD-188-141 and used for encrypting Automatic Link Etablish...
HALFLOOP-96 is a 96-bit tweakable block cipher used in high frequency radio to secure automatic link...
QTL is an ultra-lightweight block cipher designed for extremely constrained devices. The cipher has ...
KeeLoq is a lightweight block cipher with a 32-bit block size and a 64-bit key. Despite its short ke...
In this paper we analyze the recently proposed lightweight block cipher PRINTCipher. Applying alg...
Abstract. KeeLoq is a lightweight block cipher with a 32-bit block size and a 64-bit key. Despite it...
Abstract. This paper investigates the practical security of RC4 in broad-cast setting where the same...
The SoDark cipher is used to protect transmitted frames in the second and third generation automatic...
International audienceLBlock is a new lightweight block cipher proposed by Wu and Zhang (2011) [12] ...
International audiencePervasive devices are usually deployed in hostile environments where they are ...
Design and analysis of lightweight block ciphers have become more popular due to the fact that the f...
lvjiqiang AT hotmail.com Abstract. HIGHT is a 32-round block cipher with a 64-bit block size and a 1...
Side-channel attacks represent a powerful category of attacks against cryptographic devices. Still, ...