筛选条件 共查询到17条结果
排序方式
(Quantum) Collision Attacks on Reduced Simpira v2

期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (2)

Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT 2016. In this paper, we build an improved MILP model to count the dif......

Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon

期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)

Being one of the winning algorithms of the CAESAR competition and currently a second round candidate of the NIST lightweight cryptography standardizat......

Improved Rectangle Attacks on SKINNY and CRAFT

期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (2)

The boomerang and rectangle attacks are adaptions of differential crypt-analysis that regard the target cipher E as a composition of two sub-ciphers, ......

Orthros: A Low-Latency PRF

期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)

We present Orthros, a 128-bit block pseudorandom function. It is designed with primary focus on latency of fully unrolled circuits. For this purpose, ......

Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny

期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (2)

Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a......

Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128

期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)

When analyzing a block cipher, the first step is to search for some valid distinguishers, for example, the differential trails in the differential cry......

Improved Preimage Attacks on 4-Round Keccak-224/256

期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)

This paper provides an improved preimage attack method on standard 4-round Keccak-224/256. The method is based on the work pioneered by Li and Sun, wh......

Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks

期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)

The Gimli permutation proposed in CHES 2017 was designed for cross-platform performance. One main strategy to achieve such a goal is to utilize a spar......

Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Attacks

期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (2)

In this paper, we study and compare the byte-wise and bitwise linear approximations of SNOW 2.0 and SNOW 3G, and present a fast correlation attack on ......

Accelerating the Search of Differential and Linear Characteristics with the SAT Method

期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)

The introduction of the automatic search boosts the cryptanalysis of symmetric-key primitives to some degree. However, the performance of the automati......

On the Relationships between Different Methods for Degree Evaluation

期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)

In this paper, we compare several non-tight degree evaluation methods i.e., Boura and Canteaut's formula, Carlet's formula as well as Liu's numeric ma......

Resistance of SNOW-V against Fast Correlation Attacks

期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)

SNOW-V is a new member in the SNOW family of stream ciphers, hoping to be competitive in the 5G mobile communication system. In this paper, we study t......

Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives

期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (2)

This paper considers the linear cryptanalyses of Authenticated Encryptions with Associated Data (AEADs) GIFT-COFB, SUNDAE-GIFT, and HyENA. All of thes......

Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G

期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (2)

In this paper, we present an AES-based authenticated-encryption with associated-data scheme called Rocca, with the purpose to reach the requirements o......

Atom: A Stream Cipher with Double Key Filter

期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)

It has been common knowledge that for a stream cipher to be secure against generic TMD tradeoff attacks, the size of its internal state in bits needs ......

共17条页码: 1/2页15条/页