default search action
IACR Transactions on Symmetric Cryptology, Volume 2021
Volume 2021, Number 1, 2021
- Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar:
Atom: A Stream Cipher with Double Key Filter. 5-36 - Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto:
Orthros: A Low-Latency PRF. 37-77 - Olivier Bronchain, Sebastian Faust, Virginie Lallemand, Gregor Leander, Léo Perrin, François-Xavier Standaert:
MOE: Multiplication Operated Encryption with Trojan Resilience. 78-129 - Raghvendra Rohit, Kai Hu, Sumanta Sarkar, Siwei Sun:
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon. 130-155 - Rui Zong, Xiaoyang Dong, Huaifeng Chen, Yiyuan Luo, Si Wang, Zheng Li:
Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128. 156-184 - Fukang Liu, Takanori Isobe, Willi Meier:
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks. 185-216 - Le He, Xiaoen Lin, Hongbo Yu:
Improved Preimage Attacks on 4-Round Keccak-224/256. 217-238 - Rachelle Heim Boissier, Camille Noûs, Yann Rotella:
Algebraic Collision Attacks on Keccak. 239-268 - Ling Sun, Wei Wang, Meiqin Wang:
Accelerating the Search of Differential and Linear Characteristics with the SAT Method. 269-315 - Amit Kumar Chauhan, Abhishek Kumar, Somitra Kumar Sanadhya:
Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256. 316-336 - Akinori Hosoyamada, Tetsu Iwata:
Provably Quantum-Secure Tweakable Block Ciphers. 337-377 - Xinxin Gong, Bin Zhang:
Resistance of SNOW-V against Fast Correlation Attacks. 378-410 - Siwei Chen, Zejun Xiang, Xiangyong Zeng, Shasha Zhang:
On the Relationships between Different Methods for Degree Evaluation. 411-442
Volume 2021, Number 2, 2021
- Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe:
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G. 1-30 - Avijit Dutta, Mridul Nandi, Suprita Talnikar:
Permutation Based EDM: An Inverse Free BBB Secure PRF. 31-70 - Xinxin Gong, Bin Zhang:
Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Attacks. 71-103 - Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto:
Weak Keys in Reduced AEGIS and Tiaoxin. 104-139 - Hosein Hadipour, Nasour Bagheri, Ling Song:
Improved Rectangle Attacks on SKINNY and CRAFT. 140-198 - Ling Sun, Wei Wang, Meiqin Wang:
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. 199-221 - Boyu Ni, Xiaoyang Dong, Keting Jia, Qidi You:
(Quantum) Collision Attacks on Reduced Simpira v2. 222-248 - Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu:
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny. 249-291 - Nicky Mouha, Nikolay Kolomeec, Danil Akhtiamov, Ivan Sutormin, Matvey Panferov, Kseniya Titova, Tatiana Bonich, Evgeniya Ishchukova, Natalia N. Tokareva, Bulat Zhantulikov:
Maximums of the Additive Differential Probability of Exclusive-Or. 292-313 - Lorenzo Grassi, Christian Rechberger, Markus Schofnegger:
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer. 314-352 - Chun Guo, François-Xavier Standaert, Weijia Wang, Xiao Wang, Yu Yu:
Provable Security of SP Networks with Partial Non-Linear Layers. 353-388 - Philip W. Hodges, Douglas Stebila:
Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications. 389-422 - Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi:
On Length Independent Security Bounds for the PMAC Family. 423-445 - Emiljano Gjiriti, Reza Reyhanitabar, Damian Vizár:
Power Yoga: Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT. 446-468
Volume 2021, Number 3, 2021
- Elena Andreeva, Amit Singh Bhati, Bart Preneel, Damian Vizár:
1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher. 1-35 - Marcus Dansarie:
Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment. 36-53 - Jing Yang, Thomas Johansson, Alexander Maximov:
Improved guess-and-determine and distinguishing attacks on SNOW-V. 54-83 - Xiaoen Lin, Le He, Hongbo Yu:
Improved Preimage Attacks on 3-Round Keccak-224/256. 84-101 - David Gérault, Thomas Peyrin, Quan Quan Tan:
Exploring Differential-Based Distinguishers and Forgeries for ASCON. 102-136 - Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. 137-169 - Zheng Yang, Zhiting Bao, Chenglu Jin, Zhe Liu, Jianying Zhou:
PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers. 170-217
Volume 2021, Number 4, 2021
- Benoît Cogliati, Jordan Ethan, Virginie Lallemand, ByeongHak Lee, Jooyoung Lee, Marine Minier:
CTET+: A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom Permutation. 1-35 - Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang:
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives. 36-73 - Raghvendra Rohit, Santanu Sarkar:
Diving Deep into the Weak Keys of Round Reduced Ascon. 74-99 - Yao Sun:
Automatic Search of Cubes for Attacking Stream Ciphers. 100-123 - Kaisa Nyberg:
Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis. 124-137 - Nilanjan Datta, Avijit Dutta, Kushankur Dutta:
Improved Security Bound of (E/D)WCDM. 138-176
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.