×

Found 46 Documents (Results 1–46)

Horst meets Fluid-SPN: Griffin for zero-knowledge applications. (English) Zbl 07799268

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 573-606 (2023).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Provable security of HADES structure. (English) Zbl 1527.94040

Beresford, Alastair R. (ed.) et al., Cryptology and network security. 21st international conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13641, 258-276 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On self-equivalence encodings in white-box implementations. (English) Zbl 1493.94042

Dunkelman, Orr (ed.) et al., Selected areas in cryptography. 27th international conference, Halifax, NS, Canada (virtual event), October 21–23, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12804, 639-669 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Mind the middle layer: the HADES design strategy revisited. (English) Zbl 1479.94199

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 35-63 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers. (English) Zbl 1492.94095

Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 345-369 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The exchange attack: how to distinguish six rounds of AES with \(2^{88.2}\) chosen plaintexts. (English) Zbl 1455.94118

Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11923, 347-370 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

DFA on LS-designs with a practical implementation on SCREAM. (English) Zbl 1421.94062

Guilley, Sylvain (ed.), Constructive side-channel analysis and secure design. 8th international workshop, COSADE 2017, Paris, France, April 13–14, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10348, 223-247 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

SPF: a new family of efficient format-preserving encryption algorithms. (English) Zbl 1372.94416

Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 64-83 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis. (English) Zbl 1347.94058

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 196-213 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Links among impossible differential, integral and zero correlation linear cryptanalysis. (English) Zbl 1347.94059

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 95-115 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks. (English) Zbl 1347.94060

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 39-51 (2014).
MSC:  94A60 90C11
PDFBibTeX XMLCite
Full Text: DOI

General model of the single-key meet-in-the-middle distinguisher on the word-oriented block cipher. (English) Zbl 1368.94113

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 203-223 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the practical security bound of GF-NLFSR structure with SPN round function. (English) Zbl 1368.94141

Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9–10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 40-54 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linear cryptanalysis of the PP-1 and PP-2 block ciphers. (English) Zbl 1344.94041

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 107-123 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

FOAM: searching for hardware-optimal SPN structures and components with a fair comparison. (English) Zbl 1396.94087

Batina, Lejla (ed.) et al., Cryptographic hardware and embedded systems – CHES 2014. 16th international workshop, Busan, South Korea, September 23–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-662-44708-6/pbk). Lecture Notes in Computer Science 8731, 433-450 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128. (English) Zbl 1310.94144

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 183-203 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Estimating resistance against multidimensional linear attacks: an application on DEAN. (English) Zbl 1311.94085

Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 246-262 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

SPN-hash: improving the provable resistance against differential collision attacks. (English) Zbl 1304.94041

Mitrokotsa, Aikaterini (ed.) et al., Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). Lecture Notes in Computer Science 7374, 270-286 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New applications of differential bounds of the SDS structure. (English) Zbl 1182.94038

Wu, Tzong-Chen (ed.) et al., Information security. 11th international conference, ISC 2008, Taipei, Taiwan, September 15–18, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85884-3/pbk). Lecture Notes in Computer Science 5222, 367-384 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

New constructions of universal hash functions based on function sums. (English) Zbl 1172.68464

Gavrilova, Marina (ed.) et al., Computational science and its applications – ICCSA 2006. International conference, Glasgow, UK, May 8–11, 2006. Proceedings, Part III. Berlin: Springer (ISBN 3-540-34075-0/pbk). Lecture Notes in Computer Science 3982, 416-425 (2006).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On constructing of a \(32 \times 32\) binary matrix as a diffusion layer for a 256-bit block cipher. (English) Zbl 1272.94045

Rhee, Min Surp (ed.) et al., Information security and cryptology – ICISC 2006. 9th international conference, Busan, Korea, November 30–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49112-5/pbk). Lecture Notes in Computer Science 4296, 51-64 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Refined analysis of bounds related to linear and differential cryptanalysis for the AES. (English) Zbl 1117.94323

Dobbertin, Hans (ed.) et al., Advanced encryption standard – AES. 4th international conference, AES 2004, Bonn, Germany, May 10–12, 2004. Revised selected and invited papers. Berlin: Springer (ISBN 3-540-26557-0/pbk). Lecture Notes in Computer Science 3373, 42-57 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A strategy for constructing fast round functions with practical security against differential and linear cryptanalysis. (English) Zbl 0929.94016

Tavares, Stafford (ed.) et al., Selected areas in cryptography. 5th annual international workshop, SAC ’98. Kingston, Ontario, Canada, August 17–18, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1556, 264-279 (1999).
MSC:  94A60
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software