Loading…
Finding Collisions against 4-Round SHA-3-384 in Practical Time
Huang, Senyang, Ben-Yehuda, Orna Agmon, Dunkelman, Orr, Maximov, Alexander
Published in IACR Transactions on Symmetric Cryptology (09.09.2022)
Published in IACR Transactions on Symmetric Cryptology (09.09.2022)
Get full text
Journal Article
Loading…
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives
Chen, Shiyao, Guo, Chun, Guo, Jian, Liu, Li, Wang, Meiqin, Wei, Puwen, Xu, Zeyu
Published in IACR Transactions on Symmetric Cryptology (16.06.2023)
Published in IACR Transactions on Symmetric Cryptology (16.06.2023)
Get full text
Journal Article
Loading…
Cryptanalysis of Low-Data Instances of Full LowMCv2
Christian Rechberger, Hadi Soleimany, Tyge Tiessen
Published in IACR Transactions on Symmetric Cryptology (01.01.2018)
Published in IACR Transactions on Symmetric Cryptology (01.01.2018)
Get full text
Journal Article
Loading…
Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
Zhang, Zhiyu, Sun, Siwei, Wang, Caibing, Hu, Lei
Published in IACR Transactions on Symmetric Cryptology (01.01.2023)
Published in IACR Transactions on Symmetric Cryptology (01.01.2023)
Get full text
Journal Article
Loading…
Improved Attacks on LowMC with Algebraic Techniques
Sun, Yimeng, Cui, Jiamin, Wang, Meiqin
Published in IACR Transactions on Symmetric Cryptology (01.01.2023)
Published in IACR Transactions on Symmetric Cryptology (01.01.2023)
Get full text
Journal Article
Loading…
Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP
Lallemand, Virginie, Minier, Marine, Rouquette, Loïc
Published in IACR Transactions on Symmetric Cryptology (10.06.2022)
Published in IACR Transactions on Symmetric Cryptology (10.06.2022)
Get full text
Journal Article
Loading…
Loading…
1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher
Andreeva, Elena, Bhati, Amit Singh, Preneel, Bart, Vizár, Damian
Published in IACR Transactions on Symmetric Cryptology (17.09.2021)
Published in IACR Transactions on Symmetric Cryptology (17.09.2021)
Get full text
Journal Article
Loading…
A Formal Analysis of Boomerang Probabilities
Kidmose, Andreas B., Tiessen, Tyge
Published in IACR Transactions on Symmetric Cryptology (11.03.2022)
Published in IACR Transactions on Symmetric Cryptology (11.03.2022)
Get full text
Journal Article
Loading…
Improved MITM Cryptanalysis on Streebog
Hua, Jialiang, Dong, Xiaoyang, Sun, Siwei, Zhang, Zhiyu, Hu, Lei, Wang, Xiaoyun
Published in IACR Transactions on Symmetric Cryptology (01.01.2022)
Published in IACR Transactions on Symmetric Cryptology (01.01.2022)
Get full text
Journal Article
Loading…
Loading…
Increasing Precision of Division Property
Derbez, Patrick, Fouque, Pierre-Alain
Published in IACR Transactions on Symmetric Cryptology (01.12.2020)
Published in IACR Transactions on Symmetric Cryptology (01.12.2020)
Get full text
Journal Article
Loading…
Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256
Dunkelman, Orr, Ghosh, Shibam, Lambooij, Eran
Published in IACR Transactions on Symmetric Cryptology (01.01.2023)
Published in IACR Transactions on Symmetric Cryptology (01.01.2023)
Get full text
Journal Article
Loading…
Cryptanalysis of Reduced round SKINNY Block Cipher
Sadegh Sadeghi, Tahereh Mohammadi, Nasour Bagheri
Published in IACR Transactions on Symmetric Cryptology (01.01.2018)
Published in IACR Transactions on Symmetric Cryptology (01.01.2018)
Get full text
Journal Article
Loading…
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul
Published in IACR Transactions on Symmetric Cryptology (01.01.2018)
Published in IACR Transactions on Symmetric Cryptology (01.01.2018)
Get full text
Journal Article
Loading…
Loading…
On Leakage-Resilient Authenticated Encryption with Decryption Leakages
Francesco Berti, Olivier Pereira, Thomas Peters, François-Xavier Standaert
Published in IACR Transactions on Symmetric Cryptology (01.09.2017)
Published in IACR Transactions on Symmetric Cryptology (01.09.2017)
Get full text
Journal Article
Loading…
Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM
Dunkelman, Orr, Ghosh, Shibam, Lambooij, Eran
Published in IACR Transactions on Symmetric Cryptology (10.03.2023)
Published in IACR Transactions on Symmetric Cryptology (10.03.2023)
Get full text
Journal Article
Loading…