FSE 2023

March 20-24 2023

Beijing, China

Accepted Papers

Papers accepted to FSE 2023 are from four different volumes of Transactions on Symmetric Cryptology (ToSC), listed below in chronological order by volume and issue number.

ToSC 2022, issue 2

  1. Accelerating the Best Trail Search on AES-Like Ciphers

    Seonggyeom KIM; Deukjo Hong; Jaechul Sung; Seokhie Hong
    Korea University; Jeonbuk National University; University of Seoul

  2. Improved MITM Cryptanalysis on Streebog

    Jialiang Hua; Xiaoyang Dong; Siwei Sun; Zhiyu Zhang; Lei Hu; Xiaoyun Wang
    Tsinghua University; University of Chinese Academy of Sciences; Chinese Academy of Sciences

  3. Differential Trail Search in Cryptographic Primitives with Big-Circle Chi

    Alireza Mehrdad; Joan Daemen; Lorenzo Grassi; Silvia Mella
    Radboud University

  4. Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a

    Zhaocun Zhou; Dengguo Feng; Bin Zhang
    TCA Laboratory, SKLCS, Institute of Software, Chinese Academy of Science; State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Science

  5. Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP

    Virginie Lallemand; Marine Minier; Loïc Rouquette
    Université de Lorraine, CNRS, Inria, LORIA, Nancy, France; CITI, INRIA, INSA Lyon, LIRIS, UMR5201 CNRS

  6. The DRACO Stream Cipher

    Alexander Moch; Matthias Hamann; Matthias Krause; Vasily Mikhalev
    Universität Mannheim; Universität Siegen

  7. On the Quantum Security of OCB

    Varun Maram; Daniel Masny; Sikhar Patranabis; Srinivasan Raghuraman
    ETH Zurich; Meta; IBM Research India; Visa Research

  8. Fast MILP Models for Division Property

    Patrick Derbez; Baptiste Lambin
    Univ Rennes, CNRS, IRISA; Ruhr-Universität Bochum

  9. More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs

    Qun Liu; Weijia Wang; Ling Sun; Yanhong Fan; Lixuan Wu; Meiqin Wang
    Shandong University

  10. Truncated Differential Attacks on Contracting Feistel Ciphers

    Tim Beyne; Yunwen Liu
    imec-COSIC, ESAT, KU Leuven; Independent researcher

  11. Revisiting the Extension of Matsui's Algorithm 1 to Linear Hulls: Application to TinyJAMBU

    Muzhou Li; Nicky Mouha; Ling Sun; Meiqin Wang
    Shandong University; NIST

  12. Integral Cryptanalysis of WARP based on Monomial Prediction

    Hosein Hadipour; Maria Eichlseder
    Graz University of Technology

  13. New Key Recovery Attack on Reduced-Round AES

    Navid Ghaedi Bardeh; Vincent Rijmen
    Norwegian University of Science and Technology, Trondheim, Norway; iagon, Oslo, Norway; imec-COSIC KU Leuven, Leuven, Belgium; University of Bergen, Bergen, Norway

ToSC 2022, issue 3

  1. Attacks on the Firekite cipher

    Vu Nguyen; Thomas Johansson; Willi Meier
    Lund University, Department of Electrical and Information Technology; FHNW University of Applied Sciences and Arts Northwestern Switzerland

  2. New Cryptanalysis of ZUC-256 Initialization Using Modular Differences

    FUKANG LIU; Willi Meier; Santanu Sarkar; Gaoli Wang; Ryoma Ito; Takanori Isobe
    University of Hyogo; FHNW; Indian Institute of Technology Madras; East China Normal University; Shandong University; NICT; University of Hyogo; NICT; PRESTO

  3. New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting

    FUKANG LIU; Willi Meier; Santanu Sarkar; Takanori Isobe
    University of Hyogo; FHNW; Indian Institute of Technology Madras; University of Hyogo; NICT; PRESTO

  4. Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over F_p^n: Application to Poseidon

    Lorenzo Grassi; Silvia Onofri; Marco Pedicini; Luca Sozzi
    Radboud University, Nijmegen, the Netherlands; Scuola Normale Superiore di Pisa, Pisa, Italy; Università Roma Tre, Roma, Italy; Università degli Studi di Milano, Milano, Italy

  5. Low-Latency Boolean Functions and Bijective S-boxes

    Shahram Rasoolzadeh
    Radboud University, Nijmegen, The Netherlands

  6. Breaking HALFLOOP-24

    Marcus Dansarie; Patrick Derbez; Gregor Leander; Lukas Stennes
    Swedish Defence University; Univ Rennes, CNRS, IRISA; Ruhr University Bochum

  7. Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited

    Antonio Faonio; João Ribeiro; Daniele Venturi; Gianluca Brian
    EURECOM; Carnegie Mellon University; Sapienza, University of Rome

  8. Algebraic Attacks against some Arithmetization-oriented Primitives

    Augustin Bariant; Clémence Bouvier; Gaëtan Leurent; Léo Perrin
    Inria, Paris

  9. Cryptanalysis of Rocca and Feasibility of Its Security Claim

    Yosuke Todo; Akinori Hosoyamada; Akiko Inoue; Ryoma Ito; Tetsu Iwata; Kazuhiko Mimematsu; Ferdinand Sibleyras
    NTT Social Informatics Laboratories; NEC Corporation; NICT; Nagoya University

  10. Hybrid Code Lifting on Space-Hard Block Ciphers --Application to Yoroi and SPNbox

    Yosuke Todo; Takanori Isobe
    NTT Social Informatics Laboratories; University of Hyogo

  11. Finding Collisions against 4-round SHA-3-384 in Practical Time

    Senyang Huang; Orna Agmon Ben-Yehuda; Orr Dunkelman; Alexander Maximov
    Dept. of Electrical and Information Technology, Lund University, Lund, Sweden; Dept. of Computer Science, University of Haifa, Haifa, Israel; CRI, University of Haifa, Haifa, Israel; Dept. of Computer Science, University of Haifa, Haifa, Israel; Ericsson Research, Lund, Sweden

  12. Towards Tight Differential Bounds of Ascon

    Rusydi H. Makarim; Raghvendra Rohit
    Cryptography Research Centre, Technology Innovation Institute, Abu Dhabi, UAE

  13. Throwing Boomerangs into Feistel Structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE

    Hosein Hadipour; Marcel Nageler; Maria Eichlseder
    Graz University of Technology

  14. SuperBall: A New Approach for MILP Modelings of Boolean Functions

    Ting Li; Yao Sun
    State Key Laboratory Of Information Security (SKLOIS), Institute of Information Engineering, Chinese Academy of Sciences; State Key Laboratory Of Information Security (SKLOIS), Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences

ToSC 2022, issue 4

  1. Practical Attacks on the Full-round FRIET

    Senpeng Wang; Dengguo Feng; Bin Hu; Jie Guan; Tairong Shi
    State Key Laboratory of Cryptology; PLA SSF Information Engineering University

  2. SCB Mode: Semantically Secure Length-Preserving Encryption

    Fabio Banfi
    ETH Zurich

  3. New Properties of Double Boomerang Connectivity Table

    Qianqian Yang; Ling Song; Siwei Sun; Danping Shi; Lei Hu
    State Key Laboratory of Information Security, Institute of Information Engineering; Jinan University; Chinese Academy of Sciences

  4. Practical Cube Attack against Nonce-Misused Ascon

    Jules Baudrin; Anne Canteaut; Léo Perrin
    Inria

  5. Cryptanalysis of Draco

    Subhadeep Banik
    Universita della Svizzera Italiana

  6. Generalized Feistel Structures Based on Tweakable Block Ciphers

    Kazuki Nakaya; Tetsu Iwata
    Nagoya University

  7. Mind Your Path: on (Key) Dependencies in Differential Characteristics

    Thomas Peyrin; Quan Quan Tan
    Nanyang Technological University

  8. On the Lower Bound of Cost of MDS Matrices

    Ayineedi Venkateswarlu; Abhishek Kesarwani; Sumanta Sarkar
    Indian Statistical Institute, Chennai Centre; IHUB NTIHAC FOUNDATION, IIT Kanpur; University of Warwick, Coventry, UK

  9. Improved Differential and Linear Trail Bounds for ASCON (Long Paper)

    Solane El Hirch; Silvia Mella; Alireza Mehrdad; Joan Daemen
    Radboud University

  10. Exploring Integrity of AEADs with Faults: Definitions and Constructions

    Sayandeep Saha; Mustafa Khairallah; Thomas Peyrin
    Nanyang Technological University, Singapore; Seagate Research, Singapore; Nanyang Technological University, Singapore; Nanyang Technology University, Singapore

  11. Decomposing Linear Layers

    Christof Beierle; Patrick Felke; Gregor Leander; Sondre Ronjom
    Ruhr University Bochum, Bochum, Germany; University of Applied Sciences Emden-Leer, Emden, Germany; University of Bergen, Bergen, Norway

ToSC 2023, issue 1

  1. Secure Message Authentication in the Presence of Leakage and Faults (Long Paper)

    Francesco Berti; Chun Guo; Thomas Peters; Yaobin Shen; François-Xavier Standaert
    TU Darmstadt, Germany; Shandong University, China; UCLouvain, Belgium

  2. Chosen-Key Secure Even-Mansour Cipher from a Single Permutation

    Shanjie Xu; Qi Da; Chun Guo
    Shandong University, China

  3. Cryptanalysis of Reduced Round ChaCha– New Attack & Deeper Analysis

    Sabyasachi Dey; Hirendra kumar Garai; Subhamoy Maitra
    Birla Institute of Technology and Science, Pilani. Hyderabad Campus; Indian Statistical Institute, Kolkata

  4. SAT-aided Automatic Search of Boomerang Distinguishers for ARX Ciphers (Long Paper)

    Dachao Wang; Baocang Wang; Siwei Sun
    Xidian University; University of the Chinese Academy of Sciences

  5. Tight Multi-User Security Bound of \textsf{DbHtS}

    Avijit Dutta; Nilanjan Datta; Mridul Nandi; Suprita Talnikar
    TCG-CREST; Indian Statistical Institute, Kolkata

  6. Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM

    Orr Dunkelman; Shibam Ghosh; Eran Lambooij
    University Of Haifa

  7. Finding Collisions for Round-Reduced Romulus-H

    Marcel Nageler; Felix Pallua; Maria Eichlseder
    Graz University of Technology

  8. Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks

    Charlotte Lefevre
    Radboud University

  9. SoK: Modeling for Large S-boxes Oriented to Differential Probabilities and Linear Correlations (Long Paper)

    Ling Sun; Meiqin Wang
    Shandong University

  10. Subverting Telegram's End-to-End Encryption (Long Paper)

    Benoît Cogliati; Jordan Ethan; Ashwin Jha
    CISPA Helmholtz Center for Information Security, Saarbrücken, Germany