Grassi, Lorenzo; Manterola Ayala, Irati; Norberg Hovd, Martha; Øygarden, Morten; Raddum, Håvard; Wang, Qingju Cryptanalysis of symmetric primitives over rings and a key recovery attack on Rubato. (English) Zbl 07799260 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 305-339 (2023). MSC: 94A60 11T06 PDFBibTeX XMLCite \textit{L. Grassi} et al., Lect. Notes Comput. Sci. 14083, 305--339 (2023; Zbl 07799260) Full Text: DOI
Lin, Jikang; He, Jiahui; Fan, Yanhong; Wang, Meiqin From unbalanced to perfect: implementation of low energy stream ciphers. (English) Zbl 07798835 El Mrabet, Nadia (ed.) et al., Progress in cryptology – AFRICACRYPT 2023. 14th international conference on cryptology in Africa, Sousse, Tunisia, July 19–21, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 14064, 204-226 (2023). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. Lin} et al., Lect. Notes Comput. Sci. 14064, 204--226 (2023; Zbl 07798835) Full Text: DOI
Mella, Silvia; Mehrdad, Alireza; Daemen, Joan Differential and linear properties of vectorial Boolean functions based on chi. (English) Zbl 07778085 Cryptogr. Commun. 15, No. 6, 1087-1116 (2023). MSC: 94A60 94D10 PDFBibTeX XMLCite \textit{S. Mella} et al., Cryptogr. Commun. 15, No. 6, 1087--1116 (2023; Zbl 07778085) Full Text: DOI OA License
Liu, Fukang; Wang, Gaoli; Sarkar, Santanu; Anand, Ravi; Meier, Willi; Li, Yingxin; Isobe, Takanori Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP. (English) Zbl 1528.94068 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14007, 189-219 (2023). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{F. Liu} et al., Lect. Notes Comput. Sci. 14007, 189--219 (2023; Zbl 1528.94068) Full Text: DOI
Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Ronen, Eyal; Shamir, Adi Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation. (English) Zbl 1528.94044 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14007, 98-127 (2023). MSC: 94A60 65T50 PDFBibTeX XMLCite \textit{I. Dinur} et al., Lect. Notes Comput. Sci. 14007, 98--127 (2023; Zbl 1528.94044) Full Text: DOI
Xie, Xiaofeng; Tian, Tian Structural evaluation of AES-like ciphers against mixture differential cryptanalysis. (English) Zbl 07768322 Des. Codes Cryptography 91, No. 12, 3881-3899 (2023). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{X. Xie} and \textit{T. Tian}, Des. Codes Cryptography 91, No. 12, 3881--3899 (2023; Zbl 07768322) Full Text: DOI
Wang, Senpeng; Feng, Dengguo; Hu, Bin; Guan, Jie; Zhang, Kai; Shi, Tairong New method for combining Matsui’s bounding conditions with sequential encoding method. (English) Zbl 1526.94044 Des. Codes Cryptography 91, No. 11, 3603-3642 (2023). MSC: 94A60 65C10 90C11 PDFBibTeX XMLCite \textit{S. Wang} et al., Des. Codes Cryptography 91, No. 11, 3603--3642 (2023; Zbl 1526.94044) Full Text: DOI
Zhang, Kai; Lai, Xuejia; Guan, Jie; Hu, Bin Weak rotational property and its application. (English) Zbl 1522.94093 Des. Codes Cryptography 91, No. 10, 3187-3214 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Zhang} et al., Des. Codes Cryptography 91, No. 10, 3187--3214 (2023; Zbl 1522.94093) Full Text: DOI
Hambitzer, Anna; Gerault, David; Huang, Yun Ju; Aaraj, Najwa; Bellini, Emanuele NNBits: bit profiling with a deep learning ensemble based distinguisher. (English) Zbl 07745617 Rosulek, Mike (ed.), Topics in cryptology – CT-RSA 2023. Cryptographers’ track at the RSA conference 2023, San Francisco, CA, USA, April 24–27, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13871, 493-523 (2023). MSC: 68P25 68T07 94A60 PDFBibTeX XMLCite \textit{A. Hambitzer} et al., Lect. Notes Comput. Sci. 13871, 493--523 (2023; Zbl 07745617) Full Text: DOI
Chen, Siwei; Zhu, Mingming; Xiang, Zejun; Xu, Runqing; Zeng, Xiangyong; Zhang, Shasha Rotational-XOR differential rectangle cryptanalysis on Simon-like ciphers. (English) Zbl 1522.94050 Rosulek, Mike (ed.), Topics in cryptology – CT-RSA 2023. Cryptographers’ track at the RSA conference 2023, San Francisco, CA, USA, April 24–27, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13871, 305-330 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Chen} et al., Lect. Notes Comput. Sci. 13871, 305--330 (2023; Zbl 1522.94050) Full Text: DOI
Taka, Kazuma; Ishikawa, Tatsuya; Sakamoto, Kosei; Isobe, Takanori An efficient strategy to construct a better differential on multiple-branch-based designs: application to Orthros. (English) Zbl 1522.94091 Rosulek, Mike (ed.), Topics in cryptology – CT-RSA 2023. Cryptographers’ track at the RSA conference 2023, San Francisco, CA, USA, April 24–27, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13871, 277-304 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Taka} et al., Lect. Notes Comput. Sci. 13871, 277--304 (2023; Zbl 1522.94091) Full Text: DOI
Bellini, Emanuele; Gerault, David; Grados, Juan; Makarim, Rusydi H.; Peyrin, Thomas Fully automated differential-linear attacks against ARX ciphers. (English) Zbl 1522.94038 Rosulek, Mike (ed.), Topics in cryptology – CT-RSA 2023. Cryptographers’ track at the RSA conference 2023, San Francisco, CA, USA, April 24–27, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13871, 252-276 (2023). MSC: 94A60 90C11 90C05 PDFBibTeX XMLCite \textit{E. Bellini} et al., Lect. Notes Comput. Sci. 13871, 252--276 (2023; Zbl 1522.94038) Full Text: DOI
Zhang, Kai; Lai, Xuejia; Wang, Lei; Guan, Jie; Hu, Bin; Wang, Senpeng; Shi, Tairong Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework. (English) Zbl 1520.94070 Des. Codes Cryptography 91, No. 9, 2845-2878 (2023). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Zhang} et al., Des. Codes Cryptography 91, No. 9, 2845--2878 (2023; Zbl 1520.94070) Full Text: DOI
Song, Ling; Zhang, Nana; Yang, Qianqian; Shi, Danping; Zhao, Jiahao; Hu, Lei; Weng, Jian Optimizing rectangle attacks: a unified and generic framework for key recovery. (English) Zbl 1519.94187 Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13791, 410-440 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Song} et al., Lect. Notes Comput. Sci. 13791, 410--440 (2023; Zbl 1519.94187) Full Text: DOI
Bao, Zhenzhen; Guo, Jian; Liu, Meicheng; Ma, Li; Tu, Yi Enhancing differential-neural cryptanalysis. (English) Zbl 1519.94045 Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13791, 318-347 (2023). MSC: 94A60 68P25 68T05 PDFBibTeX XMLCite \textit{Z. Bao} et al., Lect. Notes Comput. Sci. 13791, 318--347 (2023; Zbl 1519.94045) Full Text: DOI
Zhang, Li; Wu, Wenling; Mao, Yongxia Impossible differential cryptanalysis on reduced-round PRINCEcore. (English) Zbl 07730571 Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 61-77 (2023). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{L. Zhang} et al., Lect. Notes Comput. Sci. 13849, 61--77 (2023; Zbl 07730571) Full Text: DOI
Ding, Tianyou; Zhang, Wentao; Zhou, Chunning Clustering effect of iterative differential and linear trails. (English) Zbl 1519.94105 Deng, Yi (ed.) et al., Information security and cryptology. 18th International conference, Inscrypt 2022, Beijing, China, December 11–13, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13837, 252-271 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Ding} et al., Lect. Notes Comput. Sci. 13837, 252--271 (2023; Zbl 1519.94105) Full Text: DOI
Cao, Weiwei; Zhang, Wentao; Zhou, Chunning New automatic search tool for searching for impossible differentials using undisturbed bits. (English) Zbl 1519.94072 Deng, Yi (ed.) et al., Information security and cryptology. 18th International conference, Inscrypt 2022, Beijing, China, December 11–13, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13837, 43-63 (2023). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{W. Cao} et al., Lect. Notes Comput. Sci. 13837, 43--63 (2023; Zbl 1519.94072) Full Text: DOI
Zhang, Lei; Wu, Ruichen; Zhang, Yuhan; Zheng, Yafei; Wu, Wenling LLLWBC: a new low-latency light-weight block cipher. (English) Zbl 1519.94202 Deng, Yi (ed.) et al., Information security and cryptology. 18th International conference, Inscrypt 2022, Beijing, China, December 11–13, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13837, 23-42 (2023). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{L. Zhang} et al., Lect. Notes Comput. Sci. 13837, 23--42 (2023; Zbl 1519.94202) Full Text: DOI
He, Jiahui; Hu, Kai; Preneel, Bart; Wang, Meiqin Stretching cube attacks: improved methods to recover massive superpolies. (English) Zbl 1519.94132 Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13794, 537-566 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{J. He} et al., Lect. Notes Comput. Sci. 13794, 537--566 (2023; Zbl 1519.94132) Full Text: DOI
Shen, Yaobin; Sibleyras, Ferdinand Key-reduced variants of 3Kf9 with beyond-birthday-bound security. (English) Zbl 1519.94186 Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13792, 525-554 (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Y. Shen} and \textit{F. Sibleyras}, Lect. Notes Comput. Sci. 13792, 525--554 (2023; Zbl 1519.94186) Full Text: DOI
Burov, Dmitry A. On scatter properties of modular addition operation over imprimitivity systems of the translation group of the binary vector space. (English. Russian original) Zbl 1519.94068 Discrete Math. Appl. 33, No. 3, 127-156 (2023); translation from Diskretn. Mat. 33, No. 3, 3-40 (2021). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{D. A. Burov}, Discrete Math. Appl. 33, No. 3, 127--156 (2023; Zbl 1519.94068); translation from Diskretn. Mat. 33, No. 3, 3--40 (2021) Full Text: DOI
Jang, Kyungbae; Baksi, Anubhab; Kim, Hyunji; Seo, Hwajeong; Chattopadhyay, Anupam Improved quantum analysis of SPECK and LowMC. (English) Zbl 07726579 Isobe, Takanori (ed.) et al., Progress in cryptology – INDOCRYPT 2022. 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13774, 517-540 (2023). MSC: 81P68 94A60 68W35 68P10 81P70 68Q06 PDFBibTeX XMLCite \textit{K. Jang} et al., Lect. Notes Comput. Sci. 13774, 517--540 (2023; Zbl 07726579) Full Text: DOI
Chakraborty, Debasmita Finding three-subset division property for ciphers with complex linear layers. (English) Zbl 1519.94078 Isobe, Takanori (ed.) et al., Progress in cryptology – INDOCRYPT 2022. 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13774, 398-421 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Chakraborty}, Lect. Notes Comput. Sci. 13774, 398--421 (2023; Zbl 1519.94078) Full Text: DOI
Bellini, Emanuele; Gerault, David; Protopapa, Matteo; Rossi, Matteo Monte Carlo tree search for automatic differential characteristics search: application to SPECK. (English) Zbl 1519.94048 Isobe, Takanori (ed.) et al., Progress in cryptology – INDOCRYPT 2022. 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13774, 373-397 (2023). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{E. Bellini} et al., Lect. Notes Comput. Sci. 13774, 373--397 (2023; Zbl 1519.94048) Full Text: DOI
Delaune, Stéphanie; Derbez, Patrick; Gontier, Arthur; Prud’homme, Charles New algorithm for exhausting optimal permutations for generalized Feistel networks. (English) Zbl 1519.94101 Isobe, Takanori (ed.) et al., Progress in cryptology – INDOCRYPT 2022. 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13774, 103-124 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Delaune} et al., Lect. Notes Comput. Sci. 13774, 103--124 (2023; Zbl 1519.94101) Full Text: DOI
Zhang, Zhongya; Wu, Wenling; Sui, Han; Wang, Bolin Post-quantum security on the Lai-Massey scheme. (English) Zbl 07720065 Des. Codes Cryptography 91, No. 8, 2687-2704 (2023). MSC: 81P94 94A60 68M25 81P40 58J28 81P70 PDFBibTeX XMLCite \textit{Z. Zhang} et al., Des. Codes Cryptography 91, No. 8, 2687--2704 (2023; Zbl 07720065) Full Text: DOI
Karthika, S. K.; Singh, Kunwar Cryptanalysis of stream cipher LIZARD using division property and MILP based cube attack. (English) Zbl 1503.94034 Discrete Appl. Math. 325, 63-78 (2023). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{S. K. Karthika} and \textit{K. Singh}, Discrete Appl. Math. 325, 63--78 (2023; Zbl 1503.94034) Full Text: DOI
Yadav, Tarun; Kumar, Manoj Modeling large S-box in MILP and a (related-key) differential attack on full round PIPO-64/128. (English) Zbl 07722917 Batina, Lejla (ed.) et al., Security, privacy, and applied cryptography engineering. 12th international conference, SPACE 2022, Jaipur, India, December 9–12, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13783, 3-27 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Yadav} and \textit{M. Kumar}, Lect. Notes Comput. Sci. 13783, 3--27 (2022; Zbl 07722917) Full Text: DOI
Zhang, Yuhan; Wu, Wenling; Zhang, Lei Improved differential attack on round-reduced LEA. (English) Zbl 1527.94073 Nguyen, Khoa (ed.) et al., Information security and privacy. 27th Australasian conference, ACISP 2022, Wollongong, NSW, Australia, November 28–30, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13494, 67-84 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Zhang} et al., Lect. Notes Comput. Sci. 13494, 67--84 (2022; Zbl 1527.94073) Full Text: DOI
Wang, Shi; Chen, Yuan; Li, Yunqing; Zeng, Xiangyong On construction of lightweight MDS matrices. (English) Zbl 1521.94131 Adv. Math. Commun. 16, No. 4, 1023-1049 (2022). MSC: 94B60 11T71 94A60 68P25 PDFBibTeX XMLCite \textit{S. Wang} et al., Adv. Math. Commun. 16, No. 4, 1023--1049 (2022; Zbl 1521.94131) Full Text: DOI
Mao, Shuping; Guo, Tingting; Wang, Peng; Hu, Lei Quantum attacks on Lai-Massey structure. (English) Zbl 1520.94062 Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 13th international workshop, PQCrypto 2022, virtual event, September 28–30, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13512, 205-229 (2022). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{S. Mao} et al., Lect. Notes Comput. Sci. 13512, 205--229 (2022; Zbl 1520.94062) Full Text: DOI
Beyne, Tim; Rijmen, Vincent Differential cryptanalysis in the fixed-key model. (English) Zbl 1517.94064 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13509, 687-716 (2022). MSC: 94A60 60C05 PDFBibTeX XMLCite \textit{T. Beyne} and \textit{V. Rijmen}, Lect. Notes Comput. Sci. 13509, 687--716 (2022; Zbl 1517.94064) Full Text: DOI
Bao, Zhenzhen; Guo, Jian; Shi, Danping; Tu, Yi Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing. (English) Zbl 1516.94022 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13507, 64-93 (2022). Reviewer: Janaka Alawatugoda (Peradeniya) MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Bao} et al., Lect. Notes Comput. Sci. 13507, 64--93 (2022; Zbl 1516.94022) Full Text: DOI
Ranea, Adrián; Vandersmissen, Joachim; Preneel, Bart Implicit white-box implementations: white-boxing ARX ciphers. (English) Zbl 1516.94050 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13507, 33-63 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Ranea} et al., Lect. Notes Comput. Sci. 13507, 33--63 (2022; Zbl 1516.94050) Full Text: DOI
Niu, Zhongfeng; Sun, Siwei; Liu, Yunwen; Li, Chao Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks. (English) Zbl 1516.94047 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13507, 3-32 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Niu} et al., Lect. Notes Comput. Sci. 13507, 3--32 (2022; Zbl 1516.94047) Full Text: DOI
Rohit, Raghvendra; Sarkar, Santanu Cryptanalysis of reduced round SPEEDY. (English) Zbl 1515.94088 Batina, Lejla (ed.) et al., Progress in cryptology – AFRICACRYPT 2022. 13th international conference on cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18–20, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13503, 133-149 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Rohit} and \textit{S. Sarkar}, Lect. Notes Comput. Sci. 13503, 133--149 (2022; Zbl 1515.94088) Full Text: DOI
Gupta, Kishan Chand; Pandey, Sumit Kumar; Samanta, Susanta FUTURE: a lightweight block cipher using an optimal diffusion matrix. (English) Zbl 1515.94072 Batina, Lejla (ed.) et al., Progress in cryptology – AFRICACRYPT 2022. 13th international conference on cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18–20, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13503, 28-52 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{K. C. Gupta} et al., Lect. Notes Comput. Sci. 13503, 28--52 (2022; Zbl 1515.94072) Full Text: DOI
Chen, Siwei; Xiang, Zejun; Zeng, Xiangyong; Zhang, Shasha Conditional cube attacks on full members of KNOT-AEAD family. (English) Zbl 1512.94074 Alcaraz, Cristina (ed.) et al., Information and communications security. 24th international conference, ICICS 2022, Canterbury, UK, September 5–8, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13407, 89-108 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Chen} et al., Lect. Notes Comput. Sci. 13407, 89--108 (2022; Zbl 1512.94074) Full Text: DOI
Lee, Yongseong; Kang, Jinkeon; Chang, Donghoon; Hong, Seokhie A preimage attack on reduced Gimli-Gash. (English) Zbl 07628051 Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 217-237 (2022). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{Y. Lee} et al., Lect. Notes Comput. Sci. 13218, 217--237 (2022; Zbl 07628051) Full Text: DOI
Wang, Feifan; Wang, Gaoli Improved differential-linear attack with application to round-reduced Speck32/64. (English) Zbl 1512.94101 Ateniese, Giuseppe (ed.) et al., Applied cryptography and network security. 20th international conference, ACNS 2022, Rome, Italy, June 20–23, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13269, 792-808 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Wang} and \textit{G. Wang}, Lect. Notes Comput. Sci. 13269, 792--808 (2022; Zbl 1512.94101) Full Text: DOI
Vandersmissen, Joachim; Ranea, Adrián; Preneel, Bart A white-box speck implementation using self-equivalence encodings. (English) Zbl 1512.94100 Ateniese, Giuseppe (ed.) et al., Applied cryptography and network security. 20th international conference, ACNS 2022, Rome, Italy, June 20–23, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13269, 771-791 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Vandersmissen} et al., Lect. Notes Comput. Sci. 13269, 771--791 (2022; Zbl 1512.94100) Full Text: DOI
Nayancy; Dutta, Sandip; Chakraborty, Soubhik A survey on implementation of lightweight block ciphers for resource constraints devices. (English) Zbl 1498.94078 J. Discrete Math. Sci. Cryptography 25, No. 5, 1377-1398 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{Nayancy} et al., J. Discrete Math. Sci. Cryptography 25, No. 5, 1377--1398 (2022; Zbl 1498.94078) Full Text: DOI
Sun, Ling; Preneel, Bart; Wang, Wei; Wang, Meiqin A greater GIFT: strengthening GIFT against statistical cryptanalysis. (English) Zbl 1496.94065 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13277, 115-144 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Sun} et al., Lect. Notes Comput. Sci. 13277, 115--144 (2022; Zbl 1496.94065) Full Text: DOI
Dong, Xiaoyang; Qin, Lingyue; Sun, Siwei; Wang, Xiaoyun Key guessing strategies for linear key-schedule algorithms in rectangle attacks. (English) Zbl 1496.94041 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13277, 3-33 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Dong} et al., Lect. Notes Comput. Sci. 13277, 3--33 (2022; Zbl 1496.94041) Full Text: DOI
Azimi, Seyyed Arash; Ranea, Adrián; Salmasizadeh, Mahmoud; Mohajeri, Javad; Aref, Mohammad Reza; Rijmen, Vincent A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis. (English) Zbl 1494.94033 Des. Codes Cryptography 90, No. 8, 1797-1855 (2022). Reviewer: Janaka Alawatugoda (Peradeniya) MSC: 94A60 PDFBibTeX XMLCite \textit{S. A. Azimi} et al., Des. Codes Cryptography 90, No. 8, 1797--1855 (2022; Zbl 1494.94033) Full Text: DOI
Fan, Yanhong; Li, Muzhou; Niu, Chao; Lu, Zhenyu; Wang, Meiqin Related-tweakey impossible differential attack on reduced-round SKINNY-AEAD M1/M3. (English) Zbl 1492.94102 Galbraith, Steven D. (ed.), Topics in cryptology – CT-RSA 2022. Cryptographers’ track at the RSA conference 2022, virtual event, March 1–2, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13161, 247-271 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Fan} et al., Lect. Notes Comput. Sci. 13161, 247--271 (2022; Zbl 1492.94102) Full Text: DOI
Cui, Jiamin; Hu, Kai; Wang, Qingju; Wang, Meiqin Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128. (English) Zbl 1492.94086 Galbraith, Steven D. (ed.), Topics in cryptology – CT-RSA 2022. Cryptographers’ track at the RSA conference 2022, virtual event, March 1–2, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13161, 223-246 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Cui} et al., Lect. Notes Comput. Sci. 13161, 223--246 (2022; Zbl 1492.94086) Full Text: DOI Link
Lu, Zhenyu; Mesnager, Sihem; Cui, Tingting; Fan, Yanhong; Wang, Meiqin An STP-based model toward designing S-boxes with good cryptographic properties. (English) Zbl 1508.94059 Des. Codes Cryptography 90, No. 5, 1179-1202 (2022). MSC: 94A60 68P25 81P94 PDFBibTeX XMLCite \textit{Z. Lu} et al., Des. Codes Cryptography 90, No. 5, 1179--1202 (2022; Zbl 1508.94059) Full Text: DOI
Chen, Shiyao; Fan, Yanhong; Sun, Ling; Fu, Yong; Zhou, Haibo; Li, Yongqing; Wang, Meiqin; Wang, Weijia; Guo, Chun SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations. (English) Zbl 1481.94091 Des. Codes Cryptography 90, No. 1, 155-198 (2022). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Chen} et al., Des. Codes Cryptography 90, No. 1, 155--198 (2022; Zbl 1481.94091) Full Text: DOI
Gueron, Shay; Jha, Ashwin; Nandi, Mridul Revisiting the security of COMET authenticated encryption scheme. (English) Zbl 1514.94091 Adhikari, Avishek (ed.) et al., Progress in cryptology – INDOCRYPT 2021. 22nd International conference on cryptology in India, Jaipur, India, December 12–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13143, 3-25 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Gueron} et al., Lect. Notes Comput. Sci. 13143, 3--25 (2021; Zbl 1514.94091) Full Text: DOI
Chen, Yu Long; Mennink, Bart; Preneel, Bart Categorization of faulty nonce misuse resistant message authentication. (English) Zbl 1514.94064 Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13092, 520-550 (2021). MSC: 94A60 94A62 68M11 68P25 PDFBibTeX XMLCite \textit{Y. L. Chen} et al., Lect. Notes Comput. Sci. 13092, 520--550 (2021; Zbl 1514.94064) Full Text: DOI
Baksi, Anubhab; Bhasin, Shivam; Breier, Jakub; Khairallah, Mustafa; Peyrin, Thomas; Sarkar, Sumanta; Sim, Siang Meng DEFAULT: cipher level resistance against differential fault attack. (English) Zbl 1514.94034 Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13091, 124-156 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Baksi} et al., Lect. Notes Comput. Sci. 13091, 124--156 (2021; Zbl 1514.94034) Full Text: DOI
Hu, Kai; Sun, Siwei; Todo, Yosuke; Wang, Meiqin; Wang, Qingju Massive superpoly recovery with nested monomial predictions. (English) Zbl 1514.94101 Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 392-421 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Hu} et al., Lect. Notes Comput. Sci. 13090, 392--421 (2021; Zbl 1514.94101) Full Text: DOI
Hebborn, Phil; Lambin, Baptiste; Leander, Gregor; Todo, Yosuke Strong and tight security guarantees against integral distinguishers. (English) Zbl 1514.94099 Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 362-391 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Hebborn} et al., Lect. Notes Comput. Sci. 13090, 362--391 (2021; Zbl 1514.94099) Full Text: DOI
Leurent, Gaëtan; Pernot, Clara; Schrottenloher, André Clustering effect in Simon and Simeck. (English) Zbl 1514.94113 Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 272-302 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Leurent} et al., Lect. Notes Comput. Sci. 13090, 272--302 (2021; Zbl 1514.94113) Full Text: DOI
Zhang, Yingjie; Lyu, Lijun; Qiao, Kexin; Zhang, Zhiyu; Sun, Siwei; Hu, Lei Automatic key recovery of Feistel ciphers: application to SIMON and SIMECK. (English) Zbl 1504.94200 Deng, Robert (ed.) et al., Information security practice and experience. 16th international conference, ISPEC 2021, Nanjing, China, December 17–19, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13107, 147-167 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Zhang} et al., Lect. Notes Comput. Sci. 13107, 147--167 (2021; Zbl 1504.94200) Full Text: DOI
Hong, Chunlei; Zhang, Shasha; Chen, Siwei; Lin, Da; Xiang, Zejun More accurate division property propagations based on optimized implementations of linear layers. (English) Zbl 1492.94123 Yu, Yu (ed.) et al., Information security and cryptology. 17th international conference, Inscrypt 2021, virtual event, August 12–14, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13007, 212-232 (2021). MSC: 94A60 90C05 PDFBibTeX XMLCite \textit{C. Hong} et al., Lect. Notes Comput. Sci. 13007, 212--232 (2021; Zbl 1492.94123) Full Text: DOI
Wang, Shichang; Hou, Shiqi; Liu, Meicheng; Lin, Dongdai Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT. (English) Zbl 1492.94170 Yu, Yu (ed.) et al., Information security and cryptology. 17th international conference, Inscrypt 2021, virtual event, August 12–14, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13007, 171-190 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Wang} et al., Lect. Notes Comput. Sci. 13007, 171--190 (2021; Zbl 1492.94170) Full Text: DOI
Yadav, Tarun; Kumar, Manoj Differential-ML distinguisher: machine learning based generic extension for differential cryptanalysis. (English) Zbl 1491.94073 Longa, Patrick (ed.) et al., Progress in cryptology – LATINCRYPT 2021. 7th international conference on cryptology and information security in Latin America, Bogotá, Colombia, October 6–8, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12912, 191-212 (2021). MSC: 94A60 68P25 68T05 PDFBibTeX XMLCite \textit{T. Yadav} and \textit{M. Kumar}, Lect. Notes Comput. Sci. 12912, 191--212 (2021; Zbl 1491.94073) Full Text: DOI
Bordes, Nicolas; Daemen, Joan; Kuijsters, Daniël; Van Assche, Gilles Thinking outside the superbox. (English) Zbl 1487.94104 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 337-367 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Bordes} et al., Lect. Notes Comput. Sci. 12827, 337--367 (2021; Zbl 1487.94104) Full Text: DOI HAL
Banik, Subhadeep; Bao, Zhenzhen; Isobe, Takanori; Kubo, Hiroyasu; Liu, Fukang; Minematsu, Kazuhiko; Sakamoto, Kosei; Shibata, Nao; Shigeri, Maki WARP: revisiting GFN for lightweight 128-bit block cipher. (English) Zbl 1485.94052 Dunkelman, Orr (ed.) et al., Selected areas in cryptography. 27th international conference, Halifax, NS, Canada (virtual event), October 21–23, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12804, 535-564 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Banik} et al., Lect. Notes Comput. Sci. 12804, 535--564 (2021; Zbl 1485.94052) Full Text: DOI
Kim, Hangi; Jeon, Yongjin; Kim, Giyoon; Kim, Jongsung; Sim, Bo-Yeon; Han, Dong-Guk; Seo, Hwajeong; Kim, Seonggyeom; Hong, Seokhie; Sung, Jaechul; Hong, Deukjo PIPO: a lightweight block cipher with efficient higher-order masking software implementations. (English) Zbl 07497442 Hong, Deukjo (ed.), Information security and cryptology – ICISC 2020. 23rd international conference, Seoul, South Korea, December 2–4, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12593, 99-122 (2021). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{H. Kim} et al., Lect. Notes Comput. Sci. 12593, 99--122 (2021; Zbl 07497442) Full Text: DOI
Gouget, Aline; Patarin, Jacques; Toulemonde, Ambre (Quantum) cryptanalysis of misty schemes. (English) Zbl 07497439 Hong, Deukjo (ed.), Information security and cryptology – ICISC 2020. 23rd international conference, Seoul, South Korea, December 2–4, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12593, 43-57 (2021). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{A. Gouget} et al., Lect. Notes Comput. Sci. 12593, 43--57 (2021; Zbl 07497439) Full Text: DOI
Bhaumik, Ritam; Nandi, Mridul; Raychaudhuri, Anik Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff. (English) Zbl 1528.94036 Des. Codes Cryptography 89, No. 10, 2255-2281 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Bhaumik} et al., Des. Codes Cryptography 89, No. 10, 2255--2281 (2021; Zbl 1528.94036) Full Text: DOI
Sadeghi, Sadegh; Rijmen, Vincent; Bagheri, Nasour Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK. (English) Zbl 1472.94062 Des. Codes Cryptography 89, No. 9, 2113-2155 (2021). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Sadeghi} et al., Des. Codes Cryptography 89, No. 9, 2113--2155 (2021; Zbl 1472.94062) Full Text: DOI
Jean, Jérémy; Nikolić, Ivica; Peyrin, Thomas; Seurin, Yannick The Deoxys AEAD family. (English) Zbl 1470.94091 J. Cryptology 34, No. 3, Paper No. 31, 51 p. (2021). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{J. Jean} et al., J. Cryptology 34, No. 3, Paper No. 31, 51 p. (2021; Zbl 1470.94091) Full Text: DOI
Song, Ling; Tu, Yi; Shi, Danping; Hu, Lei Security analysis of subterranean 2.0. (English) Zbl 1469.94113 Des. Codes Cryptography 89, No. 8, 1875-1905 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Song} et al., Des. Codes Cryptography 89, No. 8, 1875--1905 (2021; Zbl 1469.94113) Full Text: DOI
Bhattacharjee, Arghya; López, Cuauhtemoc Mancillas; List, Eik; Nandi, Mridul The Oribatida v1.3 family of lightweight authenticated encryption schemes. (English) Zbl 1468.94393 J. Math. Cryptol. 15, 305-344 (2021). MSC: 94A60 94A62 11T06 11T71 11Y16 PDFBibTeX XMLCite \textit{A. Bhattacharjee} et al., J. Math. Cryptol. 15, 305--344 (2021; Zbl 1468.94393) Full Text: DOI
Ye, Chen-Dong; Tian, Tian; Zeng, Fan-Yang The MILP-aided conditional differential attack and its application to Trivium. (English) Zbl 1457.94198 Des. Codes Cryptography 89, No. 2, 317-339 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{C.-D. Ye} et al., Des. Codes Cryptography 89, No. 2, 317--339 (2021; Zbl 1457.94198) Full Text: DOI
Dong, Xiaoyang; Sun, Siwei; Shi, Danping; Gao, Fei; Wang, Xiaoyun; Hu, Lei Quantum collision attacks on AES-like hashing with low quantum random access memories. (English) Zbl 1520.81037 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12492, 727-757 (2020). MSC: 81P68 94A60 81P47 PDFBibTeX XMLCite \textit{X. Dong} et al., Lect. Notes Comput. Sci. 12492, 727--757 (2020; Zbl 1520.81037) Full Text: DOI
Mennink, Bart Beyond birthday bound secure fresh rekeying: application to authenticated encryption. (English) Zbl 1511.94136 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 630-661 (2020). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{B. Mennink}, Lect. Notes Comput. Sci. 12491, 630--661 (2020; Zbl 1511.94136) Full Text: DOI
Hebborn, Phil; Lambin, Baptiste; Leander, Gregor; Todo, Yosuke Lower bounds on the degree of block ciphers. (English) Zbl 1511.94109 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 537-566 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Hebborn} et al., Lect. Notes Comput. Sci. 12491, 537--566 (2020; Zbl 1511.94109) Full Text: DOI
Hu, Kai; Sun, Siwei; Wang, Meiqin; Wang, Qingju An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums. (English) Zbl 1511.94112 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 446-476 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Hu} et al., Lect. Notes Comput. Sci. 12491, 446--476 (2020; Zbl 1511.94112) Full Text: DOI
Hu, Xichao; Li, Yongqiang; Jiao, Lin; Tian, Shizhu; Wang, Mingsheng Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions. (English) Zbl 1511.94113 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 415-445 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Hu} et al., Lect. Notes Comput. Sci. 12491, 415--445 (2020; Zbl 1511.94113) Full Text: DOI
Azimi, Seyyed Arash; Ranea, Adrián; Salmasizadeh, Mahmoud; Mohajeri, Javad; Aref, Mohammad Reza; Rijmen, Vincent A bit-vector differential model for the modular addition by a constant. (English) Zbl 1511.94046 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 385-414 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{S. A. Azimi} et al., Lect. Notes Comput. Sci. 12491, 385--414 (2020; Zbl 1511.94046) Full Text: DOI
Anand, Ravi; Maitra, Arpita; Mukhopadhyay, Sourav Grover on \(SIMON\). (English) Zbl 1509.81348 Quantum Inf. Process. 19, No. 9, Paper No. 340, 17 p. (2020). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{R. Anand} et al., Quantum Inf. Process. 19, No. 9, Paper No. 340, 17 p. (2020; Zbl 1509.81348) Full Text: DOI arXiv
Beierle, Christof; Biryukov, Alex; Cardoso dos Santos, Luan; Großschädl, Johann; Perrin, Léo; Udovenko, Aleksei; Velichkov, Vesselin; Wang, Qingju Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX). (English) Zbl 1504.94102 Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 419-448 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Beierle} et al., Lect. Notes Comput. Sci. 12172, 419--448 (2020; Zbl 1504.94102) Full Text: DOI
Peyrin, Thomas; Wang, Haoyang The MALICIOUS framework: embedding backdoors into tweakable block ciphers. (English) Zbl 1504.94178 Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 249-278 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Peyrin} and \textit{H. Wang}, Lect. Notes Comput. Sci. 12172, 249--278 (2020; Zbl 1504.94178) Full Text: DOI
Liu, Fukang; Isobe, Takanori; Meier, Willi Automatic verification of differential characteristics: application to reduced Gimli. (English) Zbl 1499.94045 Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 219-248 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Liu} et al., Lect. Notes Comput. Sci. 12172, 219--248 (2020; Zbl 1499.94045) Full Text: DOI
Rahman, Mostafizar; Saha, Dhiman; Paul, Goutam Cryptanalysis of FlexAEAD. (English) Zbl 1504.94180 Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2020. 12th international conference on cryptology in Africa, Cairo, Egypt, July 20–22, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12174, 152-171 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Rahman} et al., Lect. Notes Comput. Sci. 12174, 152--171 (2020; Zbl 1504.94180) Full Text: DOI
Gunsing, Aldo; Mennink, Bart The summation-truncation hybrid: reusing discarded bits for free. (English) Zbl 1503.94030 Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 187-217 (2020). MSC: 94A60 05A05 PDFBibTeX XMLCite \textit{A. Gunsing} and \textit{B. Mennink}, Lect. Notes Comput. Sci. 12170, 187--217 (2020; Zbl 1503.94030) Full Text: DOI
Malyshev, F. M. Differential characteristics of base operations in ARX-ciphers. (Russian. English summary) Zbl 1473.94116 Mat. Vopr. Kriptografii 11, No. 4, 97-105 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{F. M. Malyshev}, Mat. Vopr. Kriptografii 11, No. 4, 97--105 (2020; Zbl 1473.94116) Full Text: DOI MNR
Lu, Jinyu; Liu, Yunwen; Ashur, Tomer; Sun, Bing; Li, Chao Rotational-XOR cryptanalysis of Simon-like block ciphers. (English) Zbl 1464.94041 Liu, Joseph K. (ed.) et al., Information security and privacy. 25th Australasian conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12248, 105-124 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Lu} et al., Lect. Notes Comput. Sci. 12248, 105--124 (2020; Zbl 1464.94041) Full Text: DOI Link
Peng, Xinhang; Sun, Bing; Li, Chao Simon algorithm key-recovery attack on SIMON. (Chinese. English summary) Zbl 1463.81007 J. Henan Norm. Univ., Nat. Sci. 48, No. 5, 9-15 (2020). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{X. Peng} et al., J. Henan Norm. Univ., Nat. Sci. 48, No. 5, 9--15 (2020; Zbl 1463.81007) Full Text: DOI
Liu, Yunwen; Zhang, Wenying; Sun, Bing; Rijmen, Vincent; Liu, Guoqiang; Li, Chao; Fu, Shaojing; Cao, Meichun The phantom of differential characteristics. (English) Zbl 1458.94263 Des. Codes Cryptography 88, No. 11, 2289-2311 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Liu} et al., Des. Codes Cryptography 88, No. 11, 2289--2311 (2020; Zbl 1458.94263) Full Text: DOI
Roh, Dongyoung; Koo, Bonwook; Jung, Younghoon; Jeong, Il Woong; Lee, Dong-Geon; Kwon, Daesung; Kim, Woo-Hwan Revised version of block cipher CHAM. (English) Zbl 1446.68065 Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 1-19 (2020). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{D. Roh} et al., Lect. Notes Comput. Sci. 11975, 1--19 (2020; Zbl 1446.68065) Full Text: DOI
Chakraborti, Avik; Iwata, Tetsu; Minematsu, Kazuhiko; Nandi, Mridul Blockcipher-based authenticated encryption: how small can we go? (English) Zbl 1457.94107 J. Cryptology 33, No. 3, 703-741 (2020). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. Chakraborti} et al., J. Cryptology 33, No. 3, 703--741 (2020; Zbl 1457.94107) Full Text: DOI
Zhao, Boxin; Dong, Xiaoyang; Meier, Willi; Jia, Keting; Wang, Gaoli Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT. (English) Zbl 1448.94236 Des. Codes Cryptography 88, No. 6, 1103-1126 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Zhao} et al., Des. Codes Cryptography 88, No. 6, 1103--1126 (2020; Zbl 1448.94236) Full Text: DOI
Ashur, Tomer; Beyne, Tim; Rijmen, Vincent Revisiting the wrong-key-randomization hypothesis. (English) Zbl 1455.94113 J. Cryptology 33, No. 2, 567-594 (2020). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{T. Ashur} et al., J. Cryptology 33, No. 2, 567--594 (2020; Zbl 1455.94113) Full Text: DOI Link
Gerault, David; Lafourcade, Pascal; Minier, Marine; Solnon, Christine Computing AES related-key differential characteristics with constraint programming. (English) Zbl 1482.94049 Artif. Intell. 278, Article ID 103183, 24 p. (2020). MSC: 94A60 90C30 PDFBibTeX XMLCite \textit{D. Gerault} et al., Artif. Intell. 278, Article ID 103183, 24 p. (2020; Zbl 1482.94049) Full Text: DOI HAL
Malyshev, F. M. Probabilistic characteristics of differential and linear relations for nonhomogeneous linear medium. (Russian. English summary) Zbl 1473.94115 Mat. Vopr. Kriptografii 10, No. 1, 41-72 (2019). MSC: 94A60 60C05 PDFBibTeX XMLCite \textit{F. M. Malyshev}, Mat. Vopr. Kriptografii 10, No. 1, 41--72 (2019; Zbl 1473.94115) Full Text: DOI MNR
Gohr, Aron Improving attacks on round-reduced Speck32/64 using deep learning. (English) Zbl 1509.94091 Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11693, 150-179 (2019). MSC: 94A60 68T07 PDFBibTeX XMLCite \textit{A. Gohr}, Lect. Notes Comput. Sci. 11693, 150--179 (2019; Zbl 1509.94091) Full Text: DOI
Wang, Qian; Jin, Chenhui More accurate results on the provable security of AES against impossible differential cryptanalysis. (English) Zbl 1423.94112 Des. Codes Cryptography 87, No. 12, 3001-3018 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{Q. Wang} and \textit{C. Jin}, Des. Codes Cryptography 87, No. 12, 3001--3018 (2019; Zbl 1423.94112) Full Text: DOI
Neves, Samuel; Araujo, Filipe An observation on NORX, BLAKE2, and ChaCha. (English) Zbl 1458.94273 Inf. Process. Lett. 149, 1-5 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Neves} and \textit{F. Araujo}, Inf. Process. Lett. 149, 1--5 (2019; Zbl 1458.94273) Full Text: DOI
Bi, Wenquan; Dong, Xiaoyang; Li, Zheng; Zong, Rui; Wang, Xiaoyun MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes. (English) Zbl 1445.94015 Des. Codes Cryptography 87, No. 6, 1271-1296 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Bi} et al., Des. Codes Cryptography 87, No. 6, 1271--1296 (2019; Zbl 1445.94015) Full Text: DOI
Li, Yanbin; Wang, Meiqin Cryptanalysis of MORUS. (English) Zbl 1454.94084 Des. Codes Cryptography 87, No. 5, 1035-1058 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Li} and \textit{M. Wang}, Des. Codes Cryptography 87, No. 5, 1035--1058 (2019; Zbl 1454.94084) Full Text: DOI
Sadeghi, Sadegh; Bagheri, Nasour Security analysis of SIMECK block cipher against related-key impossible differential. (English) Zbl 1473.94126 Inf. Process. Lett. 147, 14-21 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Sadeghi} and \textit{N. Bagheri}, Inf. Process. Lett. 147, 14--21 (2019; Zbl 1473.94126) Full Text: DOI
ElSheikh, Muhammad; Tolba, Mohamed; Youssef, Amr M. Integral attacks on round-reduced Bel-T-256. (English) Zbl 1447.94034 Cid, Carlos (ed.) et al., Selected areas in cryptography – SAC 2018. 25th international conference, Calgary, AB, Canada, August 15–17, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11349, 73-91 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{M. ElSheikh} et al., Lect. Notes Comput. Sci. 11349, 73--91 (2019; Zbl 1447.94034) Full Text: DOI
Bodden, Daniël Linear cryptanalysis of reduced-round Speck with a heuristic approach: automatic search for linear trails. (English) Zbl 1517.94068 Chen, Liqun (ed.) et al., Information security. 21st international conference, ISC 2018, Guildford, UK, September 9–12, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11060, 132-150 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Bodden}, Lect. Notes Comput. Sci. 11060, 132--150 (2018; Zbl 1517.94068) Full Text: DOI