×

Found 99 Documents (Results 1–99)

Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers. (English) Zbl 1531.94071

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 694-726 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An efficient strategy to construct a better differential on multiple-branch-based designs: application to Orthros. (English) Zbl 1522.94091

Rosulek, Mike (ed.), Topics in cryptology – CT-RSA 2023. Cryptographers’ track at the RSA conference 2023, San Francisco, CA, USA, April 24–27, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13871, 277-304 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential cryptanalysis of round-reduced SPEEDY family. (English) Zbl 1519.94199

Deng, Yi (ed.) et al., Information security and cryptology. 18th International conference, Inscrypt 2022, Beijing, China, December 11–13, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13837, 272-291 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Clustering effect of iterative differential and linear trails. (English) Zbl 1519.94105

Deng, Yi (ed.) et al., Information security and cryptology. 18th International conference, Inscrypt 2022, Beijing, China, December 11–13, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13837, 252-271 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Monte Carlo tree search for automatic differential characteristics search: application to SPECK. (English) Zbl 1519.94048

Isobe, Takanori (ed.) et al., Progress in cryptology – INDOCRYPT 2022. 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13774, 373-397 (2023).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Differential cryptanalysis in the fixed-key model. (English) Zbl 1517.94064

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13509, 687-716 (2022).
MSC:  94A60 60C05
PDFBibTeX XMLCite
Full Text: DOI Link

Strong and tight security guarantees against integral distinguishers. (English) Zbl 1514.94099

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 362-391 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Clustering effect in Simon and Simeck. (English) Zbl 1514.94113

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 272-302 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A geometric approach to linear cryptanalysis. (English) Zbl 1514.94042

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 36-66 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The \(t\)-wise independence of substitution-permutation networks. (English) Zbl 1489.94104

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 454-483 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Can a differential attack work for an arbitrarily large number of rounds? (English) Zbl 07497445

Hong, Deukjo (ed.), Information security and cryptology – ICISC 2020. 23rd international conference, Seoul, South Korea, December 2–4, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12593, 157-181 (2021).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles. (English) Zbl 1479.94259

Wu, Yongdong (ed.) et al., Information security and cryptology. 16th international conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12612, 453-465 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A bit-vector differential model for the modular addition by a constant. (English) Zbl 1511.94046

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 385-414 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers. (English) Zbl 1492.94095

Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 345-369 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Rotational cryptanalysis on MAC algorithm chaskey. (English) Zbl 07314281

Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12146, 153-168 (2020).
MSC:  68M25 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Automatic tool for searching for differential characteristics in ARX ciphers and applications. (English) Zbl 1456.94087

Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11898, 115-138 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Mind the gap – a closer look at the security of block ciphers against differential cryptanalysis. (English) Zbl 1447.94017

Cid, Carlos (ed.) et al., Selected areas in cryptography – SAC 2018. 25th international conference, Calgary, AB, Canada, August 15–17, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11349, 163-190 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Speeding up MILP aided differential characteristic search with Matsui’s strategy. (English) Zbl 1517.94170

Chen, Liqun (ed.) et al., Information security. 21st international conference, ISC 2018, Guildford, UK, September 9–12, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11060, 101-115 (2018).
PDFBibTeX XMLCite
Full Text: DOI

New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network. (English) Zbl 1412.94207

Avanzi, Roberto (ed.) et al., Selected areas in cryptography – SAC 2016. 23rd international conference, St. John’s, NL, Canada, August 10–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10532, 264-283 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Transposition of AES key schedule. (English) Zbl 1360.94310

Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 84-102 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Automatic search for the best trails in ARX: application to block cipher Speck. (English) Zbl 1387.94069

Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 289-310 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Wide trail design strategy for binary mixcolumns. Enhancing lower bound of number of active S-boxes. (English) Zbl 1346.94129

Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 467-484 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Automatic differential analysis of ARX block ciphers with application to SPECK and LEA. (English) Zbl 1346.94124

Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 379-394 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Capacity and data complexity in multidimensional linear attack. (English) Zbl 1369.94540

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 141-160 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Differential attacks against SPN: a thorough analysis. (English) Zbl 1328.94061

El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer (ISBN 978-3-319-18680-1/pbk; 978-3-319-18681-8/ebook). Lecture Notes in Computer Science 9084, 45-62 (2015).
MSC:  94A60 94B05
PDFBibTeX XMLCite
Full Text: DOI HAL

Cryptanalysis of the full 8.5-round REESSE3+ block cipher. (English) Zbl 1362.94044

Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 170-186 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved top-down techniques in differential cryptanalysis. (English) Zbl 1370.94505

Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 139-156 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of Widea. (English) Zbl 1321.94073

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 39-51 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Mixing properties of operations defined on the set of \(n\)-dimensional vectors over a prime finite field. (English. Russian original) Zbl 1342.94077

Cybern. Syst. Anal. 50, No. 4, 603-612 (2014); translation from Kibern. Sist. Anal. No. 4, 135-145 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Upper bounds for the average probabilities of difference characteristics of block ciphers with alternation of Markov transformations and generalized Markov transformations. (English. Russian original) Zbl 1342.94076

Cybern. Syst. Anal. 50, No. 3, 386-393 (2014); translation from Kibern. Sist. Anal. No. 3, 71-78 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Packed ciphertexts in LWE-based homomorphic encryption. (English) Zbl 1314.94058

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 1-13 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Analysis of mixing properties of the operations of modular addition and bitwise addition defined on one carrier. (English. Russian original) Zbl 1300.94075

Cybern. Syst. Anal. 47, No. 5, 741-753 (2011); translation from Kibern. Sist. Anal. 2011, No. 5, 83-97 (2011).
MSC:  94A60 13M99 60B15
PDFBibTeX XMLCite
Full Text: DOI

Multiple differential cryptanalysis: theory and practice. (English) Zbl 1282.94034

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 35-54 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Distinguishing distributions using Chernoff information. (English) Zbl 1286.94043

Heng, Swee-Huay (ed.) et al., Provable security. 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-16279-4/pbk). Lecture Notes in Computer Science 6402, 144-165 (2010).
PDFBibTeX XMLCite
Full Text: DOI Link

Cryptographic properties and application of a generalized unbalanced Feistel network structure. (English) Zbl 1307.94048

Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 73-89 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Provable security against impossible differential cryptanalysis application to CS-Cipher. (English) Zbl 1160.94388

Le Thi, Hoai An (ed.) et al., Modelling, computation and optimization in information systems and management sciences. Second international conference MCO 2008, Metz, France - Luxembourg, September 8–10, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-87476-8/pbk). Communications in Computer and Information Science 14, 597-606 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Bug attacks. (English) Zbl 1183.94022

Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 221-240 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A unified approach to related-key attacks. (English) Zbl 1154.68382

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 73-96 (2008).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Fault analysis study of IDEA. (English) Zbl 1153.94361

Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 274-287 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

The delicate issues of addition with respect to XOR differences. (English) Zbl 1154.94438

Adams, Carlisle (ed.) et al., Selected areas in cryptography. 14th international workshop, SAC 2007, Ottawa, Canada, August 16–17, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-77359-7/pbk). Lecture Notes in Computer Science 4876, 212-231 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linear cryptanalysis of non binary ciphers. (English) Zbl 1154.94371

Adams, Carlisle (ed.) et al., Selected areas in cryptography. 14th international workshop, SAC 2007, Ottawa, Canada, August 16–17, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-77359-7/pbk). Lecture Notes in Computer Science 4876, 184-211 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the role of key schedules in attacks on iterated ciphers. (English) Zbl 1487.94127

Samarati, Pierangela (ed.) et al., Computer security – ESORICS 2004. 9th European symposium on research in computer security, Sophia Antipolis, France, September 13–15, 2004. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 3193, 322-334 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Side channel cryptanalysis of product ciphers. (English) Zbl 1487.94125

Quisquater, Jean-Jacques (ed.) et al., Computer security – ESORICS 98. 5th European symposium on research in computer security, Louvain-la-Neuve, Belgium, September 16–18, 1998 Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1485, 97-110 (1998).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the design and security of RC2. (English) Zbl 1385.94051

Vaudenay, Serge (ed.), Fast software encryption. 5th international workshop, FSE ’98. Paris, France, March 23–25, 1998. Proceedings. Berlin: Springer (ISBN 3-540-64265-X). Lect. Notes Comput. Sci. 1372, 206-221 (1998).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

JEROBOAM. (English) Zbl 1385.94019

Vaudenay, Serge (ed.), Fast software encryption. 5th international workshop, FSE ’98. Paris, France, March 23–25, 1998. Proceedings. Berlin: Springer (ISBN 3-540-64265-X). Lect. Notes Comput. Sci. 1372, 49-59 (1998).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fast software encryption: designing encryption algorithms for optimal software speed on the Intel Pentium processor. (English) Zbl 1385.94070

Biham, Eli (ed.), Fast software encryption. 4th international workshop, FSE ’97, Haifa, Israel, January 20–22, 1997. Proceedings. Berlin: Springer (ISBN 3-540-63247-6). Lect. Notes Comput. Sci. 1267, 242-259 (1997).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and triple-DES. (English) Zbl 1329.94066

Koblitz, Neal (ed.), Advances in cryptology – CRYPTO 1996. 16th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 1996. Proceedings. Berlin: Springer (ISBN 3-540-61512-1/pbk). Lect. Notes Comput. Sci. 1109, 237-251 (1996).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved differential attacks on RC5. (English) Zbl 1329.94069

Koblitz, Neal (ed.), Advances in cryptology – CRYPTO 1996. 16th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 1996. Proceedings. Berlin: Springer (ISBN 3-540-61512-1/pbk). Lect. Notes Comput. Sci. 1109, 216-228 (1996).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software