default search action
IACR Transactions on Symmetric Cryptology, Volume 2023
Volume 2023, Number 1, 2023
- Christina Boura, Bart Mennink:
Preface to Volume 2023, Issue 1. 1-4 - Benoît Cogliati, Jordan Ethan, Ashwin Jha:
Subverting Telegram's End-to-End Encryption. 5-40 - Orr Dunkelman, Shibam Ghosh, Eran Lambooij:
Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM. 41-66 - Marcel Nageler, Felix Pallua, Maria Eichlseder:
Finding Collisions for Round-Reduced Romulus-H. 67-88 - Sabyasachi Dey, Hirendra Kumar Garai, Subhamoy Maitra:
Cryptanalysis of Reduced Round ChaCha - New Attack & Deeper Analysis. 89-110 - Ling Sun, Meiqin Wang:
SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations. 111-151 - Dachao Wang, Baocang Wang, Siwei Sun:
SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers. 152-191 - Nilanjan Datta, Avijit Dutta, Mridul Nandi, Suprita Talnikar:
Tight Multi-User Security Bound of DbHtS. 192-223 - Charlotte Lefevre:
Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks. 224-243 - Shanjie Xu, Qi Da, Chun Guo:
Chosen-Key Secure Even-Mansour Cipher from a Single Permutation. 244-287 - Francesco Berti, Chun Guo, Thomas Peters, Yaobin Shen, François-Xavier Standaert:
Secure Message Authentication in the Presence of Leakage and Faults. 288-315
Volume 2023, Number 2, 2023
- Bart Mennink:
Understanding the Duplex and Its Security. 1-46 - Yaobin Shen, François-Xavier Standaert:
Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers. 47-68 - Christoph Dobraunig, Bart Mennink, Samuel Neves:
EliMAC: Speeding Up LightMAC by around 20%. 69-93 - Lorenzo Grassi:
Bounded Surjective Quadratic Functions over Fnp for MPC-/ZK-/FHE-Friendly Symmetric Primitives. 94-131 - Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu:
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives. 132-175 - Orr Dunkelman, Shibam Ghosh, Eran Lambooij:
Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256. 176-188 - Emanuele Bellini, David Gérault, Juan Grados, Rusydi H. Makarim, Thomas Peyrin:
Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP. 189-223 - Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu:
Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. 224-252
Volume 2023, Number 3, 2023
- Koustabh Ghosh, Parisa Amiri-Eliasi, Joan Daemen:
Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication. 1-24 - Roberto Avanzi, Subhadeep Banik, Orr Dunkelman, Maria Eichlseder, Shibam Ghosh, Marcel Nageler, Francesco Regazzoni:
The QARMAv2 Family of Tweakable Block Ciphers. 25-73 - Huina Li, Le He, Shiyao Chen, Jian Guo, Weidong Qiu:
Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach. 74-100 - Xavier Bonnetain, Virginie Lallemand:
On Boomerang Attacks on Quadratic Feistel Ciphers New results on KATAN and Simon. 101-145 - André Schrottenloher, Marc Stevens:
Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks. 146-183 - Emanuele Bellini, David Gérault, Anna Hambitzer, Matteo Rossi:
A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences. 184-212 - Shahram Rasoolzadeh:
Classification of All t-Resilient Boolean Functions with t + 4 Variables. 213-226
Volume 2023, Number 4, 2023
- Betül Askin Özdemir, Tim Beyne, Vincent Rijmen:
Multidimensional Linear Cryptanalysis of Feistel Ciphers. 1-27 - Sandip Kumar Mondal, Mostafizar Rahman, Santanu Sarkar, Avishek Adhikari:
Revisiting Yoyo Tricks on AES. 28-57 - Gregor Leander, Shahram Rasoolzadeh, Lukas Stennes:
Cryptanalysis of HALFLOOP Block Ciphers Destroying HALFLOOP-24. 58-82 - Bin Zhang, Ruitao Liu, Xinxin Gong, Lin Jiao:
Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher. 83-111 - Yingxin Li, Fukang Liu, Gaoli Wang:
Automating Collision Attacks on RIPEMD-160. 112-142 - Yimeng Sun, Jiamin Cui, Meiqin Wang:
Improved Attacks on LowMC with Algebraic Techniques. 143-165 - Fukang Liu, Mohammad Mahzoun, Morten Øygarden, Willi Meier:
Algebraic Attacks on RAIN and AIM Using Equivalent Representations. 166-186 - Silvia Mella, Joan Daemen, Gilles Van Assche:
Tighter Trail Bounds for Xoodoo. 187-214 - Christina Boura, Patrick Derbez, Margot Funk:
Related-Key Differential Analysis of the AES. 215-243 - Tim Beyne, Michiel Verbauwhede:
Integral Cryptanalysis Using Algebraic Transition Matrices. 244-269 - Aurélien Boeuf, Anne Canteaut, Léo Perrin:
Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES. 270-298 - Jules Baudrin, Patrick Felke, Gregor Leander, Patrick Neumann, Léo Perrin, Lukas Stennes:
Commutative Cryptanalysis Made Practical. 299-329 - Benoît Cogliati, Jordan Ethan, Ashwin Jha, Soumya Kanti Saha:
On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing. 330-364 - Nilanjan Datta, Shreya Dey, Avijit Dutta, Sougata Mandal:
Cascading Four Round LRW1 is Beyond Birthday Bound Secure. 365-390 - Niranjan Balachandran, Ashwin Jha, Mridul Nandi, Soumit Pal:
Revisiting Randomness Extraction and Key Derivation Using the CBC and Cascade Modes. 391-419 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Committing Security of Ascon: Cryptanalysis on Primitive and Proof on Mode. 420-451 - Yu Long Chen, Antonio Flórez-Gutiérrez, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Minematsu, Nicky Mouha, Yusuke Naito, Ferdinand Sibleyras, Yosuke Todo:
Key Committing Security of AEZ and More. 452-488 - Haotian Shi, Xiutao Feng, Shengyuan Xu:
A Framework with Improved Heuristics to Optimize Low-Latency Implementations of Linear Layers. 489-510
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.