Projects funded by the NCN


Information on the principal investigator and host institution

Information of the project and the call

Keywords

Equipment

Delete all

Efficient and Secure Authenticated Encryption - New Designs and Advanced Cryptanalysis

2014/15/B/ST6/05130

Keywords:

authenticated encryption cryptanalysis cryptography

Descriptors:

  • ST6_5: Cryptography, security, privacy, quantum computing

Panel:

ST6 - Computer science and informatics: informatics and information systems, computer science, scientific computing, intelligent systems

Host institution :

Instytut Podstaw Informatyki Polskiej Akademii Nauk

woj. mazowieckie

Other projects carried out by the institution 

Principal investigator (from the host institution):

prof. Józef Pieprzyk 

Number of co-investigators in the project: 5

Call: OPUS 8 - announced on 2014-09-15

Amount awarded: 780 000 PLN

Project start date (Y-m-d): 2015-07-20

Project end date (Y-m-d): 2018-07-19

Project duration:: 36 months (the same as in the proposal)

Project status: Project settled

Information in the final report

  • Publication in academic press/journals (4)
  • Articles in post-conference publications (5)
  1. Tunable multi-party high-capacity quantum key distribution based on m-generalized Fibonacci sequences using golden coding
    Authors:
    Hong Lai, Mingxing Luo, Mehmet A. Orgun, Josef Pieprzyk, Fuyuan Xiao, Cheng Zhan
    Academic press:
    Quantum Information Processing (rok: 2018, tom: 17(9), strony: 246-258), Wydawca: Springer
    Status:
    Published
    DOI:
    10.1007/s11128-018-2018-3 - link to the publication
  2. A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement
    Authors:
    Hong Lai, Mingxing Luo, Jun Zhang, Josef Pieprzyk, Lei Pan, Mehmet A. Orgun
    Academic press:
    Quantum Information Processing (rok: 2018, tom: 17(7), strony: 162-173), Wydawca: Springer
    Status:
    Published
    DOI:
    10.1007/s11128-018-1933-7 - link to the publication
  3. Practical attacks on the round-reduced PRINCE
    Authors:
    Paweł Morawiecki
    Academic press:
    IET Information Security (rok: 2017, tom: 11(3), strony: 146-151), Wydawca: IET Digital Library
    Status:
    Published
    DOI:
    10.1049/iet-ifs.2015.0432 - link to the publication
  4. Differential-linear and related key cryptanalysis of round-reduced scream
    Authors:
    Ashutosh Dhar Dwivedi, Pawel Morawiecki, Rajani Singh, Shalini Dhar
    Academic press:
    Information Processing Letters (rok: 2018, tom: 136, strony: 45420), Wydawca: Elsevier
    Status:
    Published
    DOI:
    10.1016/j.ipl.2018.03.010 - link to the publication
  1. SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition
    Authors:
    Ashutosh Dhar Dwivedi, Miloš Klouček, Paweł Morawiecki, Ivica Nikolić, Josef Pieprzyk, Sebastian Wójtowicz
    Conference:
    SECRYPT (rok: 2017, ), Wydawca: Springer
    Data:
    konferencja 24-26 czerwiec 2017
    Status:
    Published
  2. State Recovery Attacks against Pi-cipher
    Authors:
    Joseph Alley, Józef Pieprzyk
    Conference:
    Australasian Computing Education Conference (ACE) (rok: 2016, ), Wydawca: ACE
    Data:
    konferencja 2-5 luty 2016
    Status:
    Published
  3. Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN
    Authors:
    Md Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson, Josef Pieprzyk
    Conference:
    Australasian Computer Science Week Multiconference (rok: 2016, ), Wydawca: ACM Digital Library
    Data:
    konferencja 1-5 luty 2016
    Status:
    Published
  4. Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
    Authors:
    Md. Iftekhar Salam, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon-Ho Wong
    Conference:
    Applications and Techniques in Information Security (rok: 2016, ), Wydawca: ATIS
    Data:
    konferencja 26-28 październik 2016
    Status:
    Published
  5. Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security
    Authors:
    Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
    Conference:
    ESORICS (rok: 2018, ), Wydawca: Springer
    Data:
    konferencja 3-7 września 2018
    Status:
    Published