نتایج جستجو برای: Deoxys-BC

تعداد نتایج: 16886  

Journal: :IACR Trans. Symmetric Cryptol. 2017
Carlos Cid Tao Huang Thomas Peyrin Yu Sasaki Ling Song

In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384. We show that the related-tweakey differential bounds provided by the designers can be greatly improved thanks to a Mixed Integer Linear Programming (MILP) based search ...

Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal tweakable block cipher. First, we find a 4.5-round...

Journal: :Iet Information Security 2022

Deoxys-BC is the internal tweakable block cipher of authenticated encryption (AE) Deoxys family, in which Deoxys-II primary choice for use case ‘Defence depth’ among portfolio CAESAR competition. Improvements related-tweakey rectangle attacks on round-reduced using known distinguishers focussed this study. Under new related-key attack framework proposed by Dong et al. EUROCRYPT 2022, we present...

Journal: :Lecture Notes in Computer Science 2023

The boomerang attack is a cryptanalysis technique that combines two short differentials instead of using single long differential. It has been applied to many primitives, and results in the best known attacks against several AES-based ciphers (Kiasu-BC, Deoxys-BC). In this paper, we introduce general framework for with truncated differentials. We show use provides significant improvement over l...

2014
Jérémy Jean Ivica Nikolic Thomas Peyrin

We propose the TWEAKEY framework with goal to unify the design of tweakable block ciphers and of block ciphers resistant to related-key attacks. Our framework is simple, extends the key-alternating construction, and allows to build a primitive with arbitrary tweak and key sizes, given the public round permutation (for instance, the AES round). Increasing the sizes renders the security analysis ...

2014
Jérémy Jean Ivica Nikolić Thomas Peyrin

Journal: :Journal of clinical microbiology 2012
James E Ross Helio S Sader Zrinka Ivezic-Schoenfeld Susanne Paukner Ronald N Jones

MIC and disk diffusion quality control (QC) ranges were established for two new pleuromutilin antimicrobials (BC-3205 and BC-3781) in an eight-laboratory study performed according to Clinical and Laboratory Standards Institute M23-A3 guidelines. Staphylococcus aureus ATCC 29213 and 25923, Streptococcus pneumoniae ATCC 49619, and Haemophilus influenzae ATCC 4927 strains were evaluated. The propo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید