A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect
2019
IACR Transactions on Symmetric Cryptology
In the CAESAR competition, Deoxys-I and Deoxys-II are two important authenticated encryption schemes submitted by Jean et al. Recently, Deoxys-II together with Ascon, ACORN, AEGIS-128, OCB and COLM have been selected as the final CAESAR portfolio. Notably, Deoxys-II is also the primary choice for the use case "Defense in depth". However, Deoxys-I remains to be one of the third-round candidates of the CAESAR competition. Both Deoxys-I and Deoxys-II adopt Deoxys-BC-256 and Deoxys-BC-384 as their
doi:10.13154/tosc.v2019.i3.121-151
dblp:journals/tosc/ZhaoDJ19
fatcat:vrfivxmdubehhlx5m5etj6laoa