


default search action
IACR Transactions on Symmetric Cryptology, Volume 2018
Volume 2018, Number 1, 2018
- Florian Mendel, María Naya-Plasencia:

Preface to Volume 2018, Issue 1. 1-4 - Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jian Guo

, Jérémy Jean, Jean-René Reinhard, Ling Song
:
Key-Recovery Attacks on Full Kravatte. 5-28 - Thomas Fuhr, María Naya-Plasencia, Yann Rotella:

State-Recovery Attacks on Modified Ketje Jr. 29-56 - Tao Huang, Hongjun Wu

:
Distinguishing Attack on NORX Permutation. 57-73 - Gregor Leander

, Cihangir Tezcan
, Friedrich Wiemer
:
Searching for Subspace Trails and Truncated Differentials. 74-100 - Andrey Bogdanov

, Elmar Tischhauser
, Philip S. Vejre:
Multivariate Profiling of Hulls for Linear Cryptanalysis. 101-125 - Ko Stoffelen, Joan Daemen:

Column Parity Mixers. 126-159 - Yongqiang Li, Shizhu Tian, Yuyin Yu

, Mingsheng Wang:
On the Generalization of Butterfly Structure. 160-179 - Lijing Zhou, Licheng Wang, Yiru Sun:

On Efficient Constructions of Lightweight MDS Matrices. 180-200 - Zhenzhen Bao

, Jian Guo
, Lei Wang:
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions. 201-253 - Charles Bouillaguet, Claire Delaplace, Pierre-Alain Fouque

:
Revisiting and Improving Algorithms for the 3XOR Problem. 254-276 - Marie-Sarah Lacharité, Kenneth G. Paterson:

Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data. 277-313 - Srimanta Bhattacharya, Mridul Nandi

:
Revisiting Variable Output Length XOR Pseudorandom Function. 314-335 - Serge Fehr, Pierre Karpman, Bart Mennink:

Short Non-Malleable Codes from Related-Key Secure Block Ciphers. 336-352
Volume 2018, Number 2, 2018
- Subhadeep Banik

, Vasily Mikhalev, Frederik Armknecht
, Takanori Isobe, Willi Meier, Andrey Bogdanov
, Yuhei Watanabe
, Francesco Regazzoni
:
Towards Low Energy Stream Ciphers. 1-19 - Gianira N. Alfarano

, Christof Beierle
, Takanori Isobe, Stefan Kölbl, Gregor Leander
:
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny. 20-47 - Sébastien Duval

, Gaëtan Leurent
:
MDS Matrices with Lightweight Circuits. 48-78 - Stian Fauskanger, Igor A. Semaev:

Separable Statistics and Multidimensional Linear Cryptanalysis. 79-110 - Maria Eichlseder

, Daniel Kales
:
Clustering Related-Tweak Characteristics: Application to MANTIS-6. 111-132 - Lorenzo Grassi

:
Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced AES. 133-160 - Patrick Derbez

, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo
, Haoyang Wang, Meiqin Wang:
Cryptanalysis of AES-PRF and Its Dual. 161-191
Volume 2018, Number 3, 2018
- Subhadeep Banik

, Andrey Bogdanov
, Atul Luykx, Elmar Tischhauser
:
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things. 1-35 - Nilanjan Datta, Avijit Dutta

, Mridul Nandi
, Goutam Paul:
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF. 36-92 - Ling Sun, Wei Wang, Meiqin Wang:

More Accurate Differential Properties of LED64 and Midori64. 93-123 - Sadegh Sadeghi

, Tahereh Mohammadi, Nasour Bagheri
:
Cryptanalysis of Reduced round SKINNY Block Cipher. 124-162 - Christian Rechberger, Hadi Soleimany, Tyge Tiessen

:
Cryptanalysis of Low-Data Instances of Full LowMCv2. 163-181 - Ling Song

, Jian Guo:
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP. 182-214 - Eli Biham, Stav Perle:

Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity. 215-264 - Mathias Hall-Andersen, Philip S. Vejre:

Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials. 265-289 - Christina Boura, Anne Canteaut:

On the Boomerang Uniformity of Cryptographic Sboxes. 290-310 - Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay:

Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules. 311-334
Volume 2018, Number 4, 2018
- Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer:

The design of Xoodoo and Xoofff. 1-38 - Paul Crowley, Eric Biggers:

Adiantum: length-preserving encryption for entry-level processors. 39-61 - Yongzhuang Wei, Tao Ye, Wenling Wu, Enes Pasalic:

Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants. 62-79 - Christof Beierle

, Anne Canteaut, Gregor Leander
:
Nonlinear Approximations in Cryptanalysis Revisited. 80-101 - Dhiman Saha

, Mostafizar Rahman, Goutam Paul:
New Yoyo Tricks with AES-based Permutations. 102-127 - Bart Mennink:

Key Prediction Security of Keyed Sponges. 128-149 - Suyash Kandele

, Souradyuti Paul:
Key Assignment Scheme with Authenticated Encryption. 150-196 - Joan Daemen, Bart Mennink, Gilles Van Assche:

Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers. 197-228

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














