Accepted Papers

Accepted papers of IACR Transactions on Symmetric Cryptology

  • Volume 2018, Issue 2
  • Volume 2018, Issue 3
  • Volume 2018, Issue 4
  • Volume 2019, Issue 1
  1. Towards Low Energy Stream Ciphers

    Subhadeep Banik, Vasily Mikhalev, Frederik Armknecht, Takanori Isobe, Willi Meier, Andrey Bogdanov, Yuhei Watanabe, Francesco Regazzoni

  2. ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny

    Gianira N. Alfarano, Christof Beierle, Takanori Isobe, Stefan Kölbl, Gregor Leander

  3. MDS Matrices with Lightweight Circuits

    Sébastien Duval, Gaëtan Leurent

  4. Separable Statistics and Multidimensional Linear Cryptanalysis

    Stian Fauskanger, Igor Semaev

  5. Clustering Related-Tweak Characteristics: Application to MANTIS-6

    Maria Eichlseder, Daniel Kales

  6. Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced AES

    Lorenzo Grassi

  7. Cryptanalysis of AES-PRF and Its Dual

    Patrick Derbez, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo, Haoyang Wang, Meiqin Wang

  8. SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things

    Subhadeep Banik, Andrey Bogdanov, Atul Luykx, Elmar Tischhauser

  9. Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF

    Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul

  10. More Accurate Differential Properties of LED64 and Midori64

    Ling Sun, Wei Wang, Meiqin Wang

  11. Cryptanalysis of Reduced round SKINNY Block Cipher

    Sadegh Sadeghi, Tahereh Mohammadi, Nasour Bagheri

  12. Cryptanalysis of Low-Data Instances of Full LowMCv2

    Christian Rechberger, Hadi Soleimany, Tyge Tiessen

  13. Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP

    Ling Song, Jian Guo

  14. Conditional Linear Cryptanalysis – Cryptanalysis of DES with Less Than 242 Complexity

    Eli Biham, Stav Perle

  15. Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials

    Mathias Hall-Andersen, Philip S. Vejre

  16. On the Boomerang Uniformity of Cryptographic Sboxes

    Christina Boura, Anne Canteaut

  17. Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules

    Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay

  18. The design of Xoodoo and Xoofff

    Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer

  19. Adiantum: length-preserving encryption for entry-level processors

    Paul Crowley, Eric Biggers

  20. Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants

    Yongzhuang Wei, Tao Ye, Wenling Wu, Enes Pasalic

  21. Nonlinear Approximations in Cryptanalysis Revisited

    Christof Beierle, Anne Canteaut, Gregor Leander

  22. New Yoyo Tricks with AES-based Permutations

    Dhiman Saha, Mostafizar Rahman, Goutam Paul

  23. Key Prediction Security of Keyed Sponges

    Bart Mennink

  24. Key Assignment Scheme with Authenticated Encryption

    Suyash Kandele, Souradyuti Paul

  25. Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers

    Joan Daemen, Bart Mennink, Gilles Van Assche

  26. CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against Fault Attacks

    Christof Beierle; Gregor Leander; Amir Moradi; Shahram Rasoolzadeh

  27. Boomerang Connectivity Table Revisited: Applications to SKINNY and AES

    Ling Song, Xianrui Qin, Lei Hu

  28. Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits

    Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu

  29. Partitions in the S-Box of Streebog and Kuznyechik

    Léo Perrin

  30. libIntermac: Beyond Confidentiality and Integrity in Practice

    Martin R. Albrecht, Torben Brandt Hansen, Kenneth G. Paterson

  31. Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

    Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo

  32. General Diffusion Analysis: How to Find Optimal Permutations for Generalized Type-II Feistel Schemes

    Victor Cauchois, Clément Gomez, Gaël Thomas

  33. Boomerang Switch in Multiple Rounds - Application to AES Variants and Deoxys

    Haoyang Wang, Thomas Peyrin

  34. A General Proof Framework for Recent AES Distinguishers

    Christina Boura, Anne Canteaut, Daniel Coggia

  35. Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA

    Muzhou Li, Kai Hu, Meiqin Wang

  36. SoK: PEIGEN – a Platform for Evaluation, Implementation, and Generation of S-boxes

    Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki

Photo: Colin Chaigneau