Loading…
Loading…
Single-Query Quantum Hidden Shift Attacks
Bonnetain, Xavier, Schrottenloher, André
Published in IACR Transactions on Symmetric Cryptology (06.09.2024)
Published in IACR Transactions on Symmetric Cryptology (06.09.2024)
Get full text
Journal Article
Loading…
FRAST: TFHE-Friendly Cipher Based on Random S-Boxes
Cho, Mingyu, Chung, Woohyuk, Ha, Jincheol, Lee, Jooyoung, Oh, Eun-Gyeol, Son, Mincheol
Published in IACR Transactions on Symmetric Cryptology (06.09.2024)
Published in IACR Transactions on Symmetric Cryptology (06.09.2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
Cryptanalysis of Reduced Round ChaCha – New Attack & Deeper Analysis
Dey, Sabyasachi, Garai, Hirendra Kumar, Maitra, Subhamoy
Published in IACR Transactions on Symmetric Cryptology (10.03.2023)
Published in IACR Transactions on Symmetric Cryptology (10.03.2023)
Get full text
Journal Article
Loading…
Multiplex: TBC-Based Authenticated Encryption with Sponge-Like Rate
Shen, Yaobin, Peters, Thomas, Standaert, François-Xavier
Published in IACR Transactions on Symmetric Cryptology (18.06.2024)
Published in IACR Transactions on Symmetric Cryptology (18.06.2024)
Get full text
Journal Article
Loading…
Context-Committing Security of Leveled Leakage-Resilient AEAD
Dhar, Chandranan, Ethan, Jordan, Jejurikar, Ravindra, Khairallah, Mustafa, List, Eik, Mandal, Sougata
Published in IACR Transactions on Symmetric Cryptology (18.06.2024)
Published in IACR Transactions on Symmetric Cryptology (18.06.2024)
Get full text
Journal Article
Loading…
A Framework to Improve the Implementations of Linear Layers
Yuan, Yufei, Wu, Wenling, Shi, Tairong, Zhang, Lei, Zhang, Yu
Published in IACR Transactions on Symmetric Cryptology (18.06.2024)
Published in IACR Transactions on Symmetric Cryptology (18.06.2024)
Get full text
Journal Article
Loading…
Loading…
Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128
Zong, Rui, Dong, Xiaoyang, Chen, Huaifeng, Luo, Yiyuan, Wang, Si, Li, Zheng
Published in IACR Transactions on Symmetric Cryptology (01.01.2021)
Published in IACR Transactions on Symmetric Cryptology (01.01.2021)
Get full text
Journal Article
Loading…
ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki
Published in IACR Transactions on Symmetric Cryptology (22.06.2020)
Published in IACR Transactions on Symmetric Cryptology (22.06.2020)
Get full text
Journal Article
Loading…
Farfalle: parallel permutation-based cryptography
Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
Published in IACR Transactions on Symmetric Cryptology (01.12.2017)
Published in IACR Transactions on Symmetric Cryptology (01.12.2017)
Get full text
Journal Article
Loading…
Loading…
New Properties of the Double Boomerang Connectivity Table
Yang, Qianqian, Song, Ling, Sun, Siwei, Shi, Danping, Hu, Lei
Published in IACR Transactions on Symmetric Cryptology (07.12.2022)
Published in IACR Transactions on Symmetric Cryptology (07.12.2022)
Get full text
Journal Article
Loading…
Loading…
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions
Liu, Fukang, Kalam, Abul, Sarkar, Santanu, Meier, Willi
Published in IACR Transactions on Symmetric Cryptology (01.03.2024)
Published in IACR Transactions on Symmetric Cryptology (01.03.2024)
Get full text
Journal Article