期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (2)
Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT 2016. In this paper, we build an improved MILP model to count the dif......
期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)
Being one of the winning algorithms of the CAESAR competition and currently a second round candidate of the NIST lightweight cryptography standardizat......
期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (2)
The boomerang and rectangle attacks are adaptions of differential crypt-analysis that regard the target cipher E as a composition of two sub-ciphers, ......
期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)
We present Orthros, a 128-bit block pseudorandom function. It is designed with primary focus on latency of fully unrolled circuits. For this purpose, ......
期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (2)
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a......
期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)
When analyzing a block cipher, the first step is to search for some valid distinguishers, for example, the differential trails in the differential cry......
期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)
This paper provides an improved preimage attack method on standard 4-round Keccak-224/256. The method is based on the work pioneered by Li and Sun, wh......
期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)
The Gimli permutation proposed in CHES 2017 was designed for cross-platform performance. One main strategy to achieve such a goal is to utilize a spar......
期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (2)
In this paper, we study and compare the byte-wise and bitwise linear approximations of SNOW 2.0 and SNOW 3G, and present a fast correlation attack on ......
期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)
The introduction of the automatic search boosts the cryptanalysis of symmetric-key primitives to some degree. However, the performance of the automati......
期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)
In this paper, we compare several non-tight degree evaluation methods i.e., Boura and Canteaut's formula, Carlet's formula as well as Liu's numeric ma......
期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)
SNOW-V is a new member in the SNOW family of stream ciphers, hoping to be competitive in the 5G mobile communication system. In this paper, we study t......
期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (2)
This paper considers the linear cryptanalyses of Authenticated Encryptions with Associated Data (AEADs) GIFT-COFB, SUNDAE-GIFT, and HyENA. All of thes......
期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (2)
In this paper, we present an AES-based authenticated-encryption with associated-data scheme called Rocca, with the purpose to reach the requirements o......
期刊: IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021; 2021 (1)
It has been common knowledge that for a stream cipher to be secure against generic TMD tradeoff attacks, the size of its internal state in bits needs ......