Loading…
Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2
Hadipour, Hosein, Gerhalter, Simon, Sadeghi, Sadegh, Eichlseder, Maria
Published in IACR Transactions on Symmetric Cryptology (01.03.2024)
Published in IACR Transactions on Symmetric Cryptology (01.03.2024)
Get full text
Journal Article
Loading…
Finding Impossible Differentials in ARX Ciphers under Weak Keys
Ling, Qing, Cui, Tingting, Hu, Hongtao, Gong, Sijia, He, Zijun, Huang, Jiali, Xiao, Jia
Published in IACR Transactions on Symmetric Cryptology (01.03.2024)
Published in IACR Transactions on Symmetric Cryptology (01.03.2024)
Get full text
Journal Article
Loading…
Integral Cryptanalysis Using Algebraic Transition Matrices
Beyne, Tim, Verbauwhede, Michiel
Published in IACR Transactions on Symmetric Cryptology (08.12.2023)
Published in IACR Transactions on Symmetric Cryptology (08.12.2023)
Get full text
Journal Article
Loading…
Loading…
Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks
Schrottenloher, André, Stevens, Marc
Published in IACR Transactions on Symmetric Cryptology (19.09.2023)
Published in IACR Transactions on Symmetric Cryptology (19.09.2023)
Get full text
Journal Article
Loading…
On Boomerang Attacks on Quadratic Feistel Ciphers: New results on KATAN and Simon
Bonnetain, Xavier, Lallemand, Virginie
Published in IACR Transactions on Symmetric Cryptology (19.09.2023)
Published in IACR Transactions on Symmetric Cryptology (19.09.2023)
Get full text
Journal Article
Loading…
Loading…
Loading…
Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY
Zhang, Jianing, Wang, Haoyang, Tang, Deng
Published in IACR Transactions on Symmetric Cryptology (18.06.2024)
Published in IACR Transactions on Symmetric Cryptology (18.06.2024)
Get full text
Journal Article
Loading…
Analysis of AES, SKINNY, and Others with Constraint Programming
Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu
Published in IACR Transactions on Symmetric Cryptology (01.03.2017)
Published in IACR Transactions on Symmetric Cryptology (01.03.2017)
Get full text
Journal Article
Loading…
Loading…
On Impossible Boomerang Attacks
Xavier Bonnetain, Margarita Cordero, Virginie Lallemand, Marine Minier, María Naya-Plasencia
Published in IACR Transactions on Symmetric Cryptology (01.06.2024)
Published in IACR Transactions on Symmetric Cryptology (01.06.2024)
Get full text
Journal Article
Loading…
Fast AES-Based Universal Hash Functions and MACs
Augustin Bariant, Jules Baudrin, Gaëtan Leurent, Clara Pernot, Léo Perrin, Thomas Peyrin
Published in IACR Transactions on Symmetric Cryptology (01.06.2024)
Published in IACR Transactions on Symmetric Cryptology (01.06.2024)
Get full text
Journal Article
Loading…
Loading…
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits
Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu
Published in IACR Transactions on Symmetric Cryptology (19.03.2019)
Published in IACR Transactions on Symmetric Cryptology (19.03.2019)
Get full text
Journal Article
Loading…
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
Dong, Xiaoyang, Guo, Jian, Li, Shun, Pham, Phuong, Zhang, Tianyu
Published in IACR Transactions on Symmetric Cryptology (01.03.2024)
Published in IACR Transactions on Symmetric Cryptology (01.03.2024)
Get full text
Journal Article
Loading…
Loading…
XDRBG: A Proposed Deterministic Random Bit Generator Based on Any XOF
Kelsey, John, Lucks, Stefan, Müller, Stephan
Published in IACR Transactions on Symmetric Cryptology (01.03.2024)
Published in IACR Transactions on Symmetric Cryptology (01.03.2024)
Get full text
Journal Article
Loading…
Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher
Zhang, Bin, Liu, Ruitao, Gong, Xinxin, Jiao, Lin
Published in IACR Transactions on Symmetric Cryptology (08.12.2023)
Published in IACR Transactions on Symmetric Cryptology (08.12.2023)
Get full text
Journal Article