1

How to Abuse and Fix Authenticated Encryption Without Key Commitment featured image

How to Abuse and Fix Authenticated Encryption Without Key Commitment

Authenticated encryption (AE) is used in a wide variety of applications, potentially in settings for which it was not originally designed. Recent research tries to understand what …

ange-albertini
The SPHINCS+ Signature Framework featured image

The SPHINCS+ Signature Framework

We introduce SPHINCS+, a stateless hash-based signature framework. SPHINCS+ has significant advantages over the state of the art in terms of speed, signature size, and security, …

daniel-j.-bernstein
Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis featured image

Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single …

ralph-ankele
Finding Integral Distinguishers with Ease featured image

Finding Integral Distinguishers with Ease

The division property method is a technique to determine integral distinguishers on block ciphers. While the complexity of finding these distinguishers is higher, it has recently …

zahra-eskandari
Putting Wings on SPHINCS featured image

Putting Wings on SPHINCS

SPHINCS is a recently proposed stateless hash-based signature scheme and promising candidate for a post-quantum secure digital signature scheme. In this work we provide a …

avatar
Stefan Kölbl
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS featured image

The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS

We present a new tweakable block cipher family SKINNY, whose goal is to compete with NSA recent design SIMON in terms of hardware/software performances, while proving in addition …

christof-beierle
A Brief Comparison of Simon and Simeck featured image

A Brief Comparison of Simon and Simeck

Simeck is a new lightweight block cipher design based on combining the design principles of the Simon and Speck block cipher. While the design allows a smaller and more efficient …

avatar
Stefan Kölbl

State-recovery analysis of Spritz

RC4 suffered from a range of plaintext-recovery attacks using statistical biases, which use substantial, albeit close-to-practical, amounts of known keystream in applications such …

ralph-ankele
Observations on the SIMON block cipher family featured image

Observations on the SIMON block cipher family

In this paper we analyse the general class of functions underlying the Simon block cipher. In particular, we derive efficiently computable and easily implementable expressions for …

avatar
Stefan Kölbl
Security of AES with a Secret S-box featured image

Security of AES with a Secret S-box

How does the security of the AES change when the S-box is replaced by a secret S-box, about which the adversary has no knowledge? Would it be safe to reduce the number of …

tyge-tiessen