1 to 2 of 2 Results
Aug 2, 2020
Thomas Peyrin; Haoyang Wang, 2020, "Replication data for: The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers", https://doi.org/10.21979/N9/X0P4YG, DR-NTU (Data), V1
Inserting backdoors in encryption algorithms has long seemed like a very interesting, yet difficult problem. Most attempts have been unsuccessful for symmetric-key primitives so far and it remains an open problem how to build such ciphers. In this work, we propose the MALICIOUS f... |
Aug 2, 2020
Zhenzhen Bao; Ling Ding; Jian Guo; Haoyang Wang; Wenying Zhang, 2020, "Replication data for: Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes", https://doi.org/10.21979/N9/JYECIO, DR-NTU (Data), V1
Hashing modes are ways to convert a block cipher into a hash function, and those with AES as the underlying block cipher are referred to as AES hashing modes. Sasaki in 2011 introduced the first preimage attack against AES hashing modes with the AES block cipher reduced to 7 roun... |