-
Towards Low Energy Stream Ciphers
Subhadeep Banik, Vasily Mikhalev, Frederik Armknecht, Takanori Isobe, Willi Meier, Andrey Bogdanov, Yuhei Watanabe, Francesco Regazzoni
-
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny
Gianira N. Alfarano, Christof Beierle, Takanori Isobe, Stefan Kölbl, Gregor Leander
-
MDS Matrices with Lightweight Circuits
Sébastien Duval, Gaëtan Leurent
-
Separable Statistics and Multidimensional Linear Cryptanalysis
Stian Fauskanger, Igor Semaev
-
Clustering Related-Tweak Characteristics: Application to MANTIS-6
Maria Eichlseder, Daniel Kales
-
Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced AES
Lorenzo Grassi
-
Cryptanalysis of AES-PRF and Its Dual
Patrick Derbez, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo, Haoyang Wang, Meiqin Wang
-
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things
Subhadeep Banik, Andrey Bogdanov, Atul Luykx, Elmar Tischhauser
-
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF
Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul
-
More Accurate Differential Properties of LED64 and Midori64
Ling Sun, Wei Wang, Meiqin Wang
-
Cryptanalysis of Reduced round SKINNY Block Cipher
Sadegh Sadeghi, Tahereh Mohammadi, Nasour Bagheri
-
Cryptanalysis of Low-Data Instances of Full LowMCv2
Christian Rechberger, Hadi Soleimany, Tyge Tiessen
-
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP
Ling Song, Jian Guo
-
Conditional Linear Cryptanalysis – Cryptanalysis of DES with Less Than 242 Complexity
Eli Biham, Stav Perle
-
Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials
Mathias Hall-Andersen, Philip S. Vejre
-
On the Boomerang Uniformity of Cryptographic Sboxes
Christina Boura, Anne Canteaut
-
Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules
Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay
-
The design of Xoodoo and Xoofff
Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer
-
Adiantum: length-preserving encryption for entry-level processors
Paul Crowley, Eric Biggers
-
Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants
Yongzhuang Wei, Tao Ye, Wenling Wu, Enes Pasalic
-
Nonlinear Approximations in Cryptanalysis Revisited
Christof Beierle, Anne Canteaut, Gregor Leander
-
New Yoyo Tricks with AES-based Permutations
Dhiman Saha, Mostafizar Rahman, Goutam Paul
-
Key Prediction Security of Keyed Sponges
Bart Mennink
-
Key Assignment Scheme with Authenticated Encryption
Suyash Kandele, Souradyuti Paul
-
Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers
Joan Daemen, Bart Mennink, Gilles Van Assche
-
CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against Fault Attacks
Christof Beierle; Gregor Leander; Amir Moradi; Shahram Rasoolzadeh
-
Boomerang Connectivity Table Revisited: Applications to SKINNY and AES
Ling Song, Xianrui Qin, Lei Hu
-
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits
Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu
-
Partitions in the S-Box of Streebog and Kuznyechik
Léo Perrin
-
libIntermac: Beyond Confidentiality and Integrity in Practice
Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson
-
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo
-
General Diffusion Analysis: How to Find Optimal Permutations for Generalized Type-II Feistel Schemes
Victor Cauchois, Clément Gomez, Gaël Thomas
-
Boomerang Switch in Multiple Rounds - Application to AES Variants and Deoxys
Haoyang Wang, Thomas Peyrin
-
A General Proof Framework for Recent AES Distinguishers
Christina Boura, Anne Canteaut, Daniel Coggia
-
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA
Muzhou Li, Kai Hu, Meiqin Wang
-
SoK: PEIGEN – a Platform for Evaluation, Implementation, and Generation of S-boxes
Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki