default search action
IACR Transactions on Symmetric Cryptology, Volume 2019
Volume 2019, Number 1, 2019
- Florian Mendel, Yu Sasaki:
Preface to Volume 2019, Issue 1. 1-4 - Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh:
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks. 5-45 - Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson:
libInterMAC: Beyond Confidentiality and Integrity in Practice. 46-83 - Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu:
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits. 84-117 - Ling Song, Xianrui Qin, Lei Hu:
Boomerang Connectivity Table Revisited. Application to SKINNY and AES. 118-141 - Haoyang Wang, Thomas Peyrin:
Boomerang Switch in Multiple Rounds. Application to AES Variants and Deoxys. 142-169 - Christina Boura, Anne Canteaut, Daniel Coggia:
A General Proof Framework for Recent AES Distinguishers. 170-191 - Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo:
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion. 192-235 - Muzhou Li, Kai Hu, Meiqin Wang:
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA. 236-263 - Victor Cauchois, Clément Gomez, Gaël Thomas:
General Diffusion Analysis: How to Find Optimal Permutations for Generalized Type-II Feistel Schemes. 264-301 - Léo Perrin:
Partitions in the S-Box of Streebog and Kuznyechik. 302-329 - Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki:
PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes. 330-394
Volume 2019, Number 2, 2019
- Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu:
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. 1-54 - Xavier Bonnetain, María Naya-Plasencia, André Schrottenloher:
Quantum Security Analysis of AES. 55-93 - Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. 94-124 - Yusuke Naito:
The Exact Security of PMAC with Two Powering-Up Masks. 125-145 - Yaobin Shen, Lei Wang:
On Beyond-Birthday-Bound Security: Revisiting the Development of ISO/IEC 9797-1 MACs. 146-168 - Lauren De Meyer, Begül Bilgin:
Classification of Balanced Quadratic Functions. 169-192 - Orr Dunkelman, Senyang Huang:
Reconstructing an S-box from its Difference Distribution Table. 193-217 - Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Victor Mollimard:
Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks. 218-240
Volume 2019, Number 3, 2019
- Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang:
A new SNOW stream cipher called SNOW-V. 1-42 - Tony Grochow, Eik List, Mridul Nandi:
DoveMAC: A TBC-based PRF with Smaller State, Full Security, and High Rate. 43-80 - Chen-Dong Ye, Tian Tian:
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks? 81-102 - Subhadeep Banik, Khashayar Barooti, Takanori Isobe:
Cryptanalysis of Plantlet. 103-120 - Boxin Zhao, Xiaoyang Dong, Keting Jia:
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect. 121-151 - Marcel Armour, Bertram Poettering:
Substitution Attacks against Message Authentication. 152-168 - Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang, Zhenfu Cao:
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160. 169-192 - Aisling Connolly, Pooya Farshim, Georg Fuchsbauer:
Security of Symmetric Primitives against Key-Correlated Attacks. 193-230 - Abhishek Kesarwani, Santanu Sarkar, Ayineedi Venkateswarlu:
Exhaustive Search for Various Types of MDS Matrices. 231-256
Volume 2019, Number 4, 2019
- Aldo Gunsing, Joan Daemen, Bart Mennink:
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model. 1-22 - Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu:
Efficient Side-Channel Secure Message Authentication with Better Bounds. 23-53 - Ryota Nakamichi, Tetsu Iwata:
Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks. 54-80 - Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki:
INT-RUP Secure Lightweight Parallel AE Modes. 81-118 - Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras:
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE. 119-146 - Shun Li, Siwei Sun, Danping Shi, Chaoyun Li, Lei Hu:
Lightweight Iterative MDS Matrices: How Small Can We Go? 147-170 - Wenying Zhang, Meichun Cao, Jian Guo, Enes Pasalic:
Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY. 171-191 - Fukang Liu, Takanori Isobe, Willi Meier:
Cube-Based Cryptanalysis of Subterranean-SAE. 192-222 - Christoph Dobraunig, Bart Mennink:
Security of the Suffix Keyed Sponge. 223-248 - Jing Yang, Thomas Johansson, Alexander Maximov:
Vectorized linear approximations for attacks on SNOW 3G. 249-271 - Mustafa Khairallah:
Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed. 272-289 - Hosein Hadipour, Sadegh Sadeghi, Majid M. Niknam, Ling Song, Nasour Bagheri:
Comprehensive security analysis of CRAFT. 290-317 - Zhenzhen Bao, Lin Ding, Jian Guo, Haoyang Wang, Wenying Zhang:
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes. 318-347 - Maria Eichlseder, Marcel Nageler, Robert Primas:
Analyzing the Linear Keystream Biases in AEGIS. 348-368 - Jung-Keun Lee, Woo-Hwan Kim:
Multiple Linear Cryptanalysis Using Linear Statistics. 369-406 - Guozhen Liu, Weidong Qiu, Yi Tu:
New Techniques for Searching Differential Trails in Keccak. 407-437 - Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang:
Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using A Divide-and-Conquer Approach. 438-469
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.