Aragona, Riccardo; Calderini, Marco; Civino, Roberto Some group-theoretical results on Feistel networks in a long-key scenario. (English) Zbl 1451.94027 Adv. Math. Commun. 14, No. 4, 727-743 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Aragona} et al., Adv. Math. Commun. 14, No. 4, 727--743 (2020; Zbl 1451.94027) Full Text: DOI arXiv
Mesnager, Sihem; Tang, Chunming; Xiong, Maosheng On the boomerang uniformity of quadratic permutations. (English) Zbl 1465.94097 Des. Codes Cryptography 88, No. 10, 2233-2246 (2020). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{S. Mesnager} et al., Des. Codes Cryptography 88, No. 10, 2233--2246 (2020; Zbl 1465.94097) Full Text: DOI arXiv
Elsholtz, Christian; Pach, Péter Pál Caps and progression-free sets in \(\mathbb{Z}_m^n\). (English) Zbl 1465.11051 Des. Codes Cryptography 88, No. 10, 2133-2170 (2020). MSC: 11B25 20K01 94A60 51E22 PDFBibTeX XMLCite \textit{C. Elsholtz} and \textit{P. P. Pach}, Des. Codes Cryptography 88, No. 10, 2133--2170 (2020; Zbl 1465.11051) Full Text: DOI arXiv
Wu, Mengna; Li, Chengju; Wang, Zilong Characterizations and constructions of triple-cycle permutations of the form \(x^rh(x^s)\). (English) Zbl 1465.11231 Des. Codes Cryptography 88, No. 10, 2119-2132 (2020). MSC: 11T06 94A60 PDFBibTeX XMLCite \textit{M. Wu} et al., Des. Codes Cryptography 88, No. 10, 2119--2132 (2020; Zbl 1465.11231) Full Text: DOI
Sibleyras, Ferdinand Generic attack on iterated tweakable FX constructions. (English) Zbl 1457.94180 Jarecki, Stanislaw (ed.), Topics in cryptology – CT-RSA 2020. The cryptographers’ track at the RSA conference 2020, San Francisco, CA, USA, February 24–28, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12006, 1-14 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Sibleyras}, Lect. Notes Comput. Sci. 12006, 1--14 (2020; Zbl 1457.94180) Full Text: DOI Link
De Saint Guilhem, Cyprien Delpech; De Meyer, Lauren; Orsini, Emmanuela; Smart, Nigel P. BBQ: using AES in Picnic signatures. (English) Zbl 1457.94204 Paterson, Kenneth G. (ed.) et al., Selected areas in cryptography – SAC 2019. 26th international conference, Waterloo, ON, Canada, August 12–16, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11959, 669-692 (2020). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{C. D. De Saint Guilhem} et al., Lect. Notes Comput. Sci. 11959, 669--692 (2020; Zbl 1457.94204) Full Text: DOI
Minematsu, Kazuhiko A lightweight alternative to PMAC. (English) Zbl 1453.94105 Paterson, Kenneth G. (ed.) et al., Selected areas in cryptography – SAC 2019. 26th international conference, Waterloo, ON, Canada, August 12–16, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11959, 393-417 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Minematsu}, Lect. Notes Comput. Sci. 11959, 393--417 (2020; Zbl 1453.94105) Full Text: DOI
Li, Chaoyun; Preneel, Bart Improved interpolation attacks on cryptographic primitives of low algebraic degree. (English) Zbl 1453.94098 Paterson, Kenneth G. (ed.) et al., Selected areas in cryptography – SAC 2019. 26th international conference, Waterloo, ON, Canada, August 12–16, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11959, 171-193 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Li} and \textit{B. Preneel}, Lect. Notes Comput. Sci. 11959, 171--193 (2020; Zbl 1453.94098) Full Text: DOI
Grassi, Lorenzo; Rechberger, Christian Revisiting Gilbert’s known-key distinguisher. (English) Zbl 1448.94200 Des. Codes Cryptography 88, No. 7, 1401-1445 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Grassi} and \textit{C. Rechberger}, Des. Codes Cryptography 88, No. 7, 1401--1445 (2020; Zbl 1448.94200) Full Text: DOI
Seo, Hwajeong; Liu, Zhe All the HIGHT you need on Cortex-M4. (English) Zbl 1446.68066 Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 70-83 (2020). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{H. Seo} and \textit{Z. Liu}, Lect. Notes Comput. Sci. 11975, 70--83 (2020; Zbl 1446.68066) Full Text: DOI
Roh, Dongyoung; Koo, Bonwook; Jung, Younghoon; Jeong, Il Woong; Lee, Dong-Geon; Kwon, Daesung; Kim, Woo-Hwan Revised version of block cipher CHAM. (English) Zbl 1446.68065 Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 1-19 (2020). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{D. Roh} et al., Lect. Notes Comput. Sci. 11975, 1--19 (2020; Zbl 1446.68065) Full Text: DOI
Jha, Ashwin; Nandi, Mridul Tight security of cascaded LRW2. (English) Zbl 1457.94141 J. Cryptology 33, No. 3, 1272-1317 (2020). MSC: 94A60 94A62 94A55 PDFBibTeX XMLCite \textit{A. Jha} and \textit{M. Nandi}, J. Cryptology 33, No. 3, 1272--1317 (2020; Zbl 1457.94141) Full Text: DOI
Dinur, Itai Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem. (English) Zbl 1457.94123 J. Cryptology 33, No. 3, 874-909 (2020). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{I. Dinur}, J. Cryptology 33, No. 3, 874--909 (2020; Zbl 1457.94123) Full Text: DOI
Ren, Hai-Peng; Zhao, Chao-Feng; Grebogi, Celso One-way hash function based on delay-induced hyperchaos. (English) Zbl 1455.94190 Int. J. Bifurcation Chaos Appl. Sci. Eng. 30, No. 2, Article ID 2050020, 14 p. (2020). MSC: 94A60 37D45 PDFBibTeX XMLCite \textit{H.-P. Ren} et al., Int. J. Bifurcation Chaos Appl. Sci. Eng. 30, No. 2, Article ID 2050020, 14 p. (2020; Zbl 1455.94190) Full Text: DOI
Gruber, Michael; Selmke, Bodo Differential fault attacks on KLEIN. (English) Zbl 1522.94057 Polian, Ilia (ed.) et al., Constructive side-channel analysis and secure design. 10th international workshop, COSADE 2019, Darmstadt, Germany, April 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11421, 80-95 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Gruber} and \textit{B. Selmke}, Lect. Notes Comput. Sci. 11421, 80--95 (2019; Zbl 1522.94057) Full Text: DOI
Shahapure, Shravani; Sule, Virendra; Daruwala, R. D. Variation and security enhancement of block ciphers by embedding. (English) Zbl 1495.94069 J. Discrete Math. Sci. Cryptography 22, No. 2, 151-160 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Shahapure} et al., J. Discrete Math. Sci. Cryptography 22, No. 2, 151--160 (2019; Zbl 1495.94069) Full Text: DOI
Fomichev, V. M.; Koreneva, A. M.; Miftakhutdinova, A. R.; Zadorozhny, D. I. Evaluation of the maximum performance of block encryption algorithms. (English) Zbl 1473.94097 Mat. Vopr. Kriptografii 10, No. 2, 181-191 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{V. M. Fomichev} et al., Mat. Vopr. Kriptografii 10, No. 2, 181--191 (2019; Zbl 1473.94097) Full Text: DOI MNR
Lavrikov, I. V.; Shishkin, V. A. How much data may be safely processed on one key in different modes? (English) Zbl 1474.94068 Mat. Vopr. Kriptografii 10, No. 2, 125-134 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{I. V. Lavrikov} and \textit{V. A. Shishkin}, Mat. Vopr. Kriptografii 10, No. 2, 125--134 (2019; Zbl 1474.94068) Full Text: DOI MNR
Ahmetzyanova, L. R.; Alekseev, E. K.; Sedov, G. K.; Smyshlyaeva, E. S.; Smyshlyaev, S. V. Practical significance of security bounds for standardized internally re-keyed block cipher modes. (English) Zbl 1473.94091 Mat. Vopr. Kriptografii 10, No. 2, 31-46 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{L. R. Ahmetzyanova} et al., Mat. Vopr. Kriptografii 10, No. 2, 31--46 (2019; Zbl 1473.94091) Full Text: DOI MNR
Agievich, S. V. \( \mathsf{XS} \)-circuits in block ciphers. (English) Zbl 1473.94089 Mat. Vopr. Kriptografii 10, No. 2, 7-30 (2019). MSC: 94A60 05A05 PDFBibTeX XMLCite \textit{S. V. Agievich}, Mat. Vopr. Kriptografii 10, No. 2, 7--30 (2019; Zbl 1473.94089) Full Text: DOI MNR
Pogorelov, B. A.; Pudovkina, M. A. \( \otimes_{\mathcal{W}} \)-Markovianity of XSL-block ciphers connected with properties of their round functions. (Russian. English summary) Zbl 1473.94123 Mat. Vopr. Kriptografii 10, No. 1, 115-142 (2019). MSC: 94A60 60J10 05A05 PDFBibTeX XMLCite \textit{B. A. Pogorelov} and \textit{M. A. Pudovkina}, Mat. Vopr. Kriptografii 10, No. 1, 115--142 (2019; Zbl 1473.94123) Full Text: DOI MNR
Belov, S. A. An algorithm for finding the minimum degree of a polynomial over a finite field for a function over a vector space depending on the choice of an irreducible polynomial. (Russian. English summary) Zbl 1466.12001 Prikl. Diskretn. Mat. 2019, No. 43, 5-15 (2019). MSC: 12-08 94C11 94A60 PDFBibTeX XMLCite \textit{S. A. Belov}, Prikl. Diskretn. Mat. 2019, No. 43, 5--15 (2019; Zbl 1466.12001) Full Text: DOI MNR
Huang, Mingjiang; Wang, Liming Automatic tool for searching for differential characteristics in ARX ciphers and applications. (English) Zbl 1456.94087 Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11898, 115-138 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Huang} and \textit{L. Wang}, Lect. Notes Comput. Sci. 11898, 115--138 (2019; Zbl 1456.94087) Full Text: DOI
Wang, Senpeng; Hu, Bin; Guan, Jie; Zhang, Kai; Shi, Tairong MILP-aided method of searching division property using three subsets and applications. (English) Zbl 1455.94197 Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11923, 398-427 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Wang} et al., Lect. Notes Comput. Sci. 11923, 398--427 (2019; Zbl 1455.94197) Full Text: DOI
Jha, Ashwin; List, Eik; Minematsu, Kazuhiko; Mishra, Sweta; Nandi, Mridul XHX – a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing. (English) Zbl 1454.94073 Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 207-227 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Jha} et al., Lect. Notes Comput. Sci. 11368, 207--227 (2019; Zbl 1454.94073) Full Text: DOI
Kosuge, Haruhisa; Tanaka, Hidema Theoretical security evaluation against side-channel cube attack with key enumeration. (English) Zbl 1454.94076 Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 145-165 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Kosuge} and \textit{H. Tanaka}, Lect. Notes Comput. Sci. 11368, 145--165 (2019; Zbl 1454.94076) Full Text: DOI
Dinur, Itai; Nadler, Niv Multi-target attacks on the Picnic signature scheme and related protocols. (English) Zbl 1509.94156 Ishai, Yuval (ed.) et al., Advances in cryptology – EUROCRYPT 2019. 38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11478, 699-727 (2019). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{I. Dinur} and \textit{N. Nadler}, Lect. Notes Comput. Sci. 11478, 699--727 (2019; Zbl 1509.94156) Full Text: DOI
Canteaut, Anne; Lallemand, Virginie; Leander, Gregor; Neumann, Patrick; Wiemer, Friedrich BISON instantiating the whitened swap-or-not construction. (English) Zbl 1509.94074 Ishai, Yuval (ed.) et al., Advances in cryptology – EUROCRYPT 2019. 38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11478, 585-616 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Canteaut} et al., Lect. Notes Comput. Sci. 11478, 585--616 (2019; Zbl 1509.94074) Full Text: DOI Link
Dinur, Itai; Kales, Daniel; Promitzer, Angela; Ramacher, Sebastian; Rechberger, Christian Linear equivalence of block ciphers with partial non-linear layers: application to LowMC. (English) Zbl 1470.94083 Ishai, Yuval (ed.) et al., Advances in cryptology – EUROCRYPT 2019. 38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11476, 343-372 (2019). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{I. Dinur} et al., Lect. Notes Comput. Sci. 11476, 343--372 (2019; Zbl 1470.94083) Full Text: DOI
Banik, Subhadeep; Bossert, Jannis; Jana, Amit; List, Eik; Lucks, Stefan; Meier, Willi; Rahman, Mostafizar; Saha, Dhiman; Sasaki, Yu Cryptanalysis of ForkAES. (English) Zbl 1458.94212 Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11464, 43-63 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Banik} et al., Lect. Notes Comput. Sci. 11464, 43--63 (2019; Zbl 1458.94212) Full Text: DOI
Jha, Ashwin; Mancillas-López, Cuauhtemoc; Nandi, Mridul; Sen Gupta, Sourav On random read access in \(\textsf{OCB}\). (English) Zbl 1433.94086 IEEE Trans. Inf. Theory 65, No. 12, 8325-8344 (2019). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. Jha} et al., IEEE Trans. Inf. Theory 65, No. 12, 8325--8344 (2019; Zbl 1433.94086) Full Text: DOI
Zhu, Baoyu; Dong, Xiaoyang; Yu, Hongbo MILP-based differential attack on round-reduced GIFT. (English) Zbl 1509.94147 Matsui, Mitsuru (ed.), Topics in cryptology – CT-RSA 2019. The cryptographers’ track at the RSA conference 2019, San Francisco, CA, USA, March 4–8, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11405, 372-390 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Zhu} et al., Lect. Notes Comput. Sci. 11405, 372--390 (2019; Zbl 1509.94147) Full Text: DOI
Xu, Linhong; Guo, Jiansheng; Cui, Jingyi; Li, Mingming Related-key impossible differential attack on Piccolo. (Chinese. English summary) Zbl 1449.94065 J. Softw. 30, No. 8, 2349-2361 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Xu} et al., J. Softw. 30, No. 8, 2349--2361 (2019; Zbl 1449.94065) Full Text: DOI
Li, Mingming; Guo, Jiansheng; Cui, Jingyi; Xu, Linhong Truncated impossible differential cryptanalysis of Midori-64. (Chinese. English summary) Zbl 1449.94060 J. Softw. 30, No. 8, 2337-2348 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Li} et al., J. Softw. 30, No. 8, 2337--2348 (2019; Zbl 1449.94060) Full Text: DOI
Liu, Shuai; Hu, Bin Homomorphic operation of block cipher circuits based on MGSW15 scheme. (Chinese. English summary) Zbl 1449.94061 J. Sichuan Univ., Nat. Sci. Ed. 56, No. 4, 661-670 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Liu} and \textit{B. Hu}, J. Sichuan Univ., Nat. Sci. Ed. 56, No. 4, 661--670 (2019; Zbl 1449.94061) Full Text: DOI
Naito, Yusuke Optimally indifferentiable double-block-length hashing without post-processing and with support for longer key than single block. (English) Zbl 1453.94108 Schwabe, Peter (ed.) et al., Progress in cryptology – LATINCRYPT 2019. 6th international conference on cryptology and information security in Latin America, Santiago de Chile, Chile, October 2–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11774, 65-85 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Naito}, Lect. Notes Comput. Sci. 11774, 65--85 (2019; Zbl 1453.94108) Full Text: DOI
Hirose, Shoichi; Shikata, Junji History-free sequential aggregate MAC revisited. (English) Zbl 1426.94105 Steinfeld, Ron (ed.) et al., Provable security. 13th international conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11821, 77-93 (2019). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Hirose} and \textit{J. Shikata}, Lect. Notes Comput. Sci. 11821, 77--93 (2019; Zbl 1426.94105) Full Text: DOI
Li, Rongjia; Jin, Chenhui; Pan, Hongchen Key recovery attacks on reduced-round Joltik-BC in the single-key setting. (English) Zbl 1458.94262 Inf. Process. Lett. 151, Article ID 105834 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Li} et al., Inf. Process. Lett. 151, Article ID 105834 (2019; Zbl 1458.94262) Full Text: DOI
Nyberg, Kaisa Affine linear cryptanalysis. (English) Zbl 1412.94197 Cryptogr. Commun. 11, No. 3, 367-377 (2019). MSC: 94A60 11T71 68P25 PDFBibTeX XMLCite \textit{K. Nyberg}, Cryptogr. Commun. 11, No. 3, 367--377 (2019; Zbl 1412.94197) Full Text: DOI Link
Wang, Xing-Yuan; Li, Zhi-Ming A stream/block combination image encryption algorithm using logistic matrix to scramble. (English) Zbl 1462.94050 Int. J. Nonlinear Sci. Numer. Simul. 20, No. 2, 167-177 (2019). MSC: 94A60 94A08 PDFBibTeX XMLCite \textit{X.-Y. Wang} and \textit{Z.-M. Li}, Int. J. Nonlinear Sci. Numer. Simul. 20, No. 2, 167--177 (2019; Zbl 1462.94050) Full Text: DOI
Gupta, Kishan Chand; Pandey, Sumit Kumar; Venkateswarlu, Ayineedi Almost involutory recursive MDS diffusion layers. (English) Zbl 1421.94055 Des. Codes Cryptography 87, No. 2-3, 609-626 (2019). MSC: 94A60 94B15 11T71 PDFBibTeX XMLCite \textit{K. C. Gupta} et al., Des. Codes Cryptography 87, No. 2--3, 609--626 (2019; Zbl 1421.94055) Full Text: DOI
Vafaei, Navid; Bagheri, Nasour; Saha, Sayandeep; Mukhopadhyay, Debdeep Differential fault attack on SKINNY block cipher. (English) Zbl 1525.94054 Chattopadhyay, Anupam (ed.) et al., Security, privacy, and applied cryptography engineering. 8th international conference, SPACE 2018, Kanpur, India, December 15–19, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11348, 177-197 (2018). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{N. Vafaei} et al., Lect. Notes Comput. Sci. 11348, 177--197 (2018; Zbl 1525.94054) Full Text: DOI
Gupta, Devansh; Tripathy, Somanath; Mazumdar, Bodhisatwa Correlation power analysis on KASUMI: attack and countermeasure. (English) Zbl 1525.94040 Chattopadhyay, Anupam (ed.) et al., Security, privacy, and applied cryptography engineering. 8th international conference, SPACE 2018, Kanpur, India, December 15–19, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11348, 142-156 (2018). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Gupta} et al., Lect. Notes Comput. Sci. 11348, 142--156 (2018; Zbl 1525.94040) Full Text: DOI
Aragona, Riccardo; Rimoldi, Anna; Sala, Massimiliano A note on an infeasible linearization of some block ciphers. (English) Zbl 1481.94082 J. Discrete Math. Sci. Cryptography 21, No. 1, 209-218 (2018). MSC: 94A60 20B25 PDFBibTeX XMLCite \textit{R. Aragona} et al., J. Discrete Math. Sci. Cryptography 21, No. 1, 209--218 (2018; Zbl 1481.94082) Full Text: DOI arXiv
Pogorelov, B. A.; Pudovkina, M. A. Permutation homomorphisms of block ciphers and \({\otimes_{\mathbf{W}}} \)-Markovian property. (Russian. English summary) Zbl 1475.94151 Mat. Vopr. Kriptografii 9, No. 3, 109-126 (2018). MSC: 94A60 60J10 PDFBibTeX XMLCite \textit{B. A. Pogorelov} and \textit{M. A. Pudovkina}, Mat. Vopr. Kriptografii 9, No. 3, 109--126 (2018; Zbl 1475.94151) Full Text: DOI MNR
Rybkin, A. S. On software implementation of Kuznyechik on Intel CPUs. (English) Zbl 1472.68004 Mat. Vopr. Kriptografii 9, No. 2, 117-127 (2018). MSC: 68-04 68P25 94A60 PDFBibTeX XMLCite \textit{A. S. Rybkin}, Mat. Vopr. Kriptografii 9, No. 2, 117--127 (2018; Zbl 1472.68004) Full Text: DOI MNR
Vlasova, V. V.; Pudovkina, M. A. Group properties of block ciphers of the Russian standards GOST R 34.11-2012 and GOST R 34.12-2015. (English) Zbl 1475.94172 Mat. Vopr. Kriptografii 9, No. 2, 59-70 (2018). MSC: 94A60 20B35 PDFBibTeX XMLCite \textit{V. V. Vlasova} and \textit{M. A. Pudovkina}, Mat. Vopr. Kriptografii 9, No. 2, 59--70 (2018; Zbl 1475.94172) Full Text: DOI MNR
Burov, D. A.; Pogorelov, B. A. The permutation group insight on the diffusion property of linear mappings. (English) Zbl 1475.94109 Mat. Vopr. Kriptografii 9, No. 2, 47-58 (2018). MSC: 94A60 20B20 20B05 PDFBibTeX XMLCite \textit{D. A. Burov} and \textit{B. A. Pogorelov}, Mat. Vopr. Kriptografii 9, No. 2, 47--58 (2018; Zbl 1475.94109) Full Text: DOI MNR
Huang, Mingjiang; Wang, Liming; Zhang, Yan Improved automatic search algorithm for differential and linear cryptanalysis on SIMECK and the applications. (English) Zbl 1458.94243 Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 664-681 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Huang} et al., Lect. Notes Comput. Sci. 11149, 664--681 (2018; Zbl 1458.94243) Full Text: DOI
Minematsu, Kazuhiko; Sasaki, Kentarou; Tanaka, Yuki Count-then-permute: a precision-free alternative to inversion sampling. (English) Zbl 1507.94048 Smart, Nigel P. (ed.), Topics in cryptology – CT-RSA 2018. The cryptographers’ track at the RSA conference 2018, San Francisco, CA, USA, April 16–20, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10808, 264-278 (2018). MSC: 94A60 60E05 94A20 PDFBibTeX XMLCite \textit{K. Minematsu} et al., Lect. Notes Comput. Sci. 10808, 264--278 (2018; Zbl 1507.94048) Full Text: DOI
Zhang, Shiwei; Chen, Shaozhen Automatic search algorithm for impossible differential trials and zero-correlation linear trials in SIMON. (Chinese. English summary) Zbl 1424.68156 J. Softw. 29, No. 11, 3544-3553 (2018). MSC: 68T20 68P25 PDFBibTeX XMLCite \textit{S. Zhang} and \textit{S. Chen}, J. Softw. 29, No. 11, 3544--3553 (2018; Zbl 1424.68156) Full Text: DOI
Anand, Ravi; Siddhanti, Akhilesh; Maitra, Subhamoy; Mukhopadhyay, Sourav Differential fault attack on SIMON with very few faults. (English) Zbl 1407.94070 Chakraborty, Debrup (ed.) et al., Progress in cryptology – INDOCRYPT 2018. 19th international conference on cryptology in India, New Delhi, India, December 9–12, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11356, 107-119 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Anand} et al., Lect. Notes Comput. Sci. 11356, 107--119 (2018; Zbl 1407.94070) Full Text: DOI
Zhao, Yanmin; Liu, Yu; Wang, Meiqin Improved differential attack on 23-round SMS4. (Chinese. English summary) Zbl 1424.68072 J. Softw. 29, No. 9, 2821-2828 (2018). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{Y. Zhao} et al., J. Softw. 29, No. 9, 2821--2828 (2018; Zbl 1424.68072) Full Text: DOI
Chakraborti, Avik; Datta, Nilanjan; Nandi, Mridul On the optimality of non-linear computations for symmetric key primitives. (English) Zbl 1420.94028 J. Math. Cryptol. 12, No. 4, 241-259 (2018). MSC: 94A40 68P25 94A62 PDFBibTeX XMLCite \textit{A. Chakraborti} et al., J. Math. Cryptol. 12, No. 4, 241--259 (2018; Zbl 1420.94028) Full Text: DOI
Bhaumik, Ritam; List, Eik; Nandi, Mridul ZCZ – achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls. (English) Zbl 1446.94103 Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 336-366 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Bhaumik} et al., Lect. Notes Comput. Sci. 11272, 336--366 (2018; Zbl 1446.94103) Full Text: DOI
Lee, ByeongHak; Lee, Jooyoung Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model. (English) Zbl 1446.94148 Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 305-335 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Lee} and \textit{J. Lee}, Lect. Notes Comput. Sci. 11272, 305--335 (2018; Zbl 1446.94148) Full Text: DOI
Mennink, Bart Towards tight security of cascaded LRW2. (English) Zbl 1430.94083 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 192-222 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Mennink}, Lect. Notes Comput. Sci. 11240, 192--222 (2018; Zbl 1430.94083) Full Text: DOI
Nakahara, Jorge jun. Lai-Massey cipher designs. History, design criteria and cryptanalysis. (English) Zbl 1411.94002 Cham: Springer (ISBN 978-3-319-68272-3/hbk; 978-3-319-68273-0/ebook). xvii, 726 p. (2018). Reviewer: Wilfried Meidl (Linz) MSC: 94-02 94A60 94B60 PDFBibTeX XMLCite \textit{J. Nakahara jun.}, Lai-Massey cipher designs. History, design criteria and cryptanalysis. Cham: Springer (2018; Zbl 1411.94002) Full Text: DOI
Zhang, Xiangyang; Shen, Yaobin; Yan, Hailun; Zou, Ying; Wan, Ming; Wu, Zheyi; Wang, Lei Length-preserving encryption based on single-key tweakable block cipher. (English) Zbl 1443.94086 Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 313-326 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Zhang} et al., Lect. Notes Comput. Sci. 11192, 313--326 (2018; Zbl 1443.94086) Full Text: DOI
Cogliati, Benoît Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model. (English) Zbl 1442.94034 Des. Codes Cryptography 86, No. 12, 2747-2763 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Cogliati}, Des. Codes Cryptography 86, No. 12, 2747--2763 (2018; Zbl 1442.94034) Full Text: DOI Link
Cogliati, Benoît; Seurin, Yannick Analysis of the single-permutation encrypted Davies-Meyer construction. (English) Zbl 1442.94035 Des. Codes Cryptography 86, No. 12, 2703-2723 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Cogliati} and \textit{Y. Seurin}, Des. Codes Cryptography 86, No. 12, 2703--2723 (2018; Zbl 1442.94035) Full Text: DOI
Sasaki, Yu Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT. (English) Zbl 1398.94157 Inomata, Atsuo (ed.) et al., Advances in information and computer security. 13th international workshop on security, IWSEC 2018, Sendai, Japan, September 3–5, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-97915-1/pbk; 978-3-319-97916-8/ebook). Lecture Notes in Computer Science 11049, 227-243 (2018). MSC: 94A60 90C10 PDFBibTeX XMLCite \textit{Y. Sasaki}, Lect. Notes Comput. Sci. 11049, 227--243 (2018; Zbl 1398.94157) Full Text: DOI
Cheng, Lu; Wei, Yuechuan; Li, Anhui; Pan, Xiaozhong Multidimensional zero-correlation linear cryptanalysis on Midori. (Chinese. English summary) Zbl 1413.94042 J. Shandong Univ., Nat. Sci. 53, No. 2, 88-94 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Cheng} et al., J. Shandong Univ., Nat. Sci. 53, No. 2, 88--94 (2018; Zbl 1413.94042)
Calderini, Marco A note on some algebraic trapdoors for block ciphers. (English) Zbl 1401.94140 Adv. Math. Commun. 12, No. 3, 515-524 (2018). MSC: 94A60 20B15 20B35 PDFBibTeX XMLCite \textit{M. Calderini}, Adv. Math. Commun. 12, No. 3, 515--524 (2018; Zbl 1401.94140) Full Text: DOI arXiv
Sarkar, Sumanta; Syed, Habeeb Bounds on differential and linear branch number of permutations. (English) Zbl 1444.94098 Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 207-224 (2018). MSC: 94A60 05A05 PDFBibTeX XMLCite \textit{S. Sarkar} and \textit{H. Syed}, Lect. Notes Comput. Sci. 10946, 207--224 (2018; Zbl 1444.94098) Full Text: DOI
Sasaki, Yu Related-key boomerang attacks on full ANU lightweight block cipher. (English) Zbl 1440.94080 Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 421-439 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Sasaki}, Lect. Notes Comput. Sci. 10892, 421--439 (2018; Zbl 1440.94080) Full Text: DOI
Almazrooie, Mishal; Samsudin, Azman; Abdullah, Rosni; Mutter, Kussay N. Quantum reversible circuit of AES-128. (English) Zbl 1395.81098 Quantum Inf. Process. 17, No. 5, Paper No. 112, 30 p. (2018). MSC: 81P94 94A60 81P68 68U20 94C05 68P10 PDFBibTeX XMLCite \textit{M. Almazrooie} et al., Quantum Inf. Process. 17, No. 5, Paper No. 112, 30 p. (2018; Zbl 1395.81098) Full Text: DOI
Dinur, Itai An improved affine equivalence algorithm for random permutations. (English) Zbl 1423.94067 Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 413-442 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Dinur}, Lect. Notes Comput. Sci. 10820, 413--442 (2018; Zbl 1423.94067) Full Text: DOI
Koo, Bonwook; Roh, Dongyoung; Kim, Hyeonjin; Jung, Younghoon; Lee, Dong-Geon; Kwon, Daesung CHAM: a family of lightweight block ciphers for resource-constrained devices. (English) Zbl 1507.94042 Kim, Howon (ed.) et al., Information security and cryptology – ICISC 2017. 20th international conference, Seoul, South Korea, November 29 – December 1, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10779, 3-25 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Koo} et al., Lect. Notes Comput. Sci. 10779, 3--25 (2018; Zbl 1507.94042) Full Text: DOI
Jha, Ashwin; Nandi, Mridul On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers. (English) Zbl 1387.94086 Cryptogr. Commun. 10, No. 5, 731-753 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Jha} and \textit{M. Nandi}, Cryptogr. Commun. 10, No. 5, 731--753 (2018; Zbl 1387.94086) Full Text: DOI
Dwivedi, Ashutosh Dhar; Morawiecki, Paweł; Singh, Rajani; Dhar, Shalini Differential-linear and related key cryptanalysis of round-reduced scream. (English) Zbl 1457.94127 Inf. Process. Lett. 136, 5-8 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{A. D. Dwivedi} et al., Inf. Process. Lett. 136, 5--8 (2018; Zbl 1457.94127) Full Text: DOI
Wei, Yuechuan; Rong, Yisheng; Fan, Cunyang Differential fault attacks on lightweight cipher LBlock. (English) Zbl 1390.68283 Fundam. Inform. 157, No. 1-2, 125-139 (2018). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{Y. Wei} et al., Fundam. Inform. 157, No. 1--2, 125--139 (2018; Zbl 1390.68283) Full Text: DOI
AlTawy, Riham; Rohit, Raghvendra; He, Morgan; Mandal, Kalikinkar; Yang, Gangqiang; Gong, Guang sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives. (English) Zbl 1384.94023 Adams, Carlisle (ed.) et al., Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). Lecture Notes in Computer Science 10719, 129-150 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{R. AlTawy} et al., Lect. Notes Comput. Sci. 10719, 129--150 (2018; Zbl 1384.94023) Full Text: DOI
Ma, Chujiao; Chandy, John; Michel, Laurent; Liu, Fanghui; Cruz, Waldemar Influence of error on Hamming weights for ASCA. (English) Zbl 1439.94049 Chen, Xiaofeng (ed.) et al., Information security and cryptology. 13th international conference, Inscrypt 2017, Xi’an, China, November 3–5, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10726, 447-460 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Ma} et al., Lect. Notes Comput. Sci. 10726, 447--460 (2018; Zbl 1439.94049) Full Text: DOI
Yin, Jun; Ma, Chuyan; Lyu, Lijun; Song, Jian; Zeng, Guang; Ma, Chuangui; Wei, Fushan Improved cryptanalysis of an ISO standard lightweight block cipher with refined MILP modelling. (English) Zbl 1439.94072 Chen, Xiaofeng (ed.) et al., Information security and cryptology. 13th international conference, Inscrypt 2017, Xi’an, China, November 3–5, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10726, 404-426 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Yin} et al., Lect. Notes Comput. Sci. 10726, 404--426 (2018; Zbl 1439.94072) Full Text: DOI
Alekseychuk, A. N. Non-asymptotic lower bounds for the data complexity of statistical attacks on symmetric cryptosystems. (English. Russian original) Zbl 1481.94080 Cybern. Syst. Anal. 54, No. 1, 83-93 (2018); translation from Kibern. Sist. Anal. 2018, No. 1, 93-104 (2018). MSC: 94A60 62F03 PDFBibTeX XMLCite \textit{A. N. Alekseychuk}, Cybern. Syst. Anal. 54, No. 1, 83--93 (2018; Zbl 1481.94080); translation from Kibern. Sist. Anal. 2018, No. 1, 93--104 (2018) Full Text: DOI
Lin, Li; Wu, Wenling Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512. (English) Zbl 1414.94913 Des. Codes Cryptography 86, No. 4, 721-741 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Lin} and \textit{W. Wu}, Des. Codes Cryptography 86, No. 4, 721--741 (2018; Zbl 1414.94913) Full Text: DOI
Qahur Al Mahri, Hassan; Simpson, Leonie; Bartlett, Harry; Dawson, Ed; Wong, Kenneth Koon-Ho A fundamental flaw in the ++AE authenticated encryption mode. (English) Zbl 1391.94790 J. Math. Cryptol. 12, No. 1, 37-42 (2018). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{H. Qahur Al Mahri} et al., J. Math. Cryptol. 12, No. 1, 37--42 (2018; Zbl 1391.94790) Full Text: DOI Link
Hong, Deukjo; Koo, Bonwook; Seo, Changho Differential property of Present-like structure. (English) Zbl 1431.94111 Discrete Appl. Math. 241, 13-24 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Hong} et al., Discrete Appl. Math. 241, 13--24 (2018; Zbl 1431.94111) Full Text: DOI
Forler, Christian; List, Eik; Lucks, Stefan; Wenzel, Jakob POEx: a beyond-birthday-bound-secure on-line cipher. (English) Zbl 1379.94037 Cryptogr. Commun. 10, No. 1, 177-193 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Forler} et al., Cryptogr. Commun. 10, No. 1, 177--193 (2018; Zbl 1379.94037) Full Text: DOI
Keller, Marcel; Orsini, Emmanuela; Rotaru, Dragos; Scholl, Peter; Soria-Vazquez, Eduardo; Vivek, Srinivas Faster secure multi-party computation of AES and DES using lookup tables. (English) Zbl 1521.94047 Gollmann, Dieter (ed.) et al., Applied cryptography and network security. 15th international conference, ACNS 2017, Kanazawa, Japan, July 10–12, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10355, 229-249 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Keller} et al., Lect. Notes Comput. Sci. 10355, 229--249 (2017; Zbl 1521.94047) Full Text: DOI Link
Ankele, Ralph; Banik, Subhadeep; Chakraborti, Avik; List, Eik; Mendel, Florian; Sim, Siang Meng; Wang, Gaoli Related-key impossible-differential attack on reduced-round Skinny. (English) Zbl 1521.94024 Gollmann, Dieter (ed.) et al., Applied cryptography and network security. 15th international conference, ACNS 2017, Kanazawa, Japan, July 10–12, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10355, 208-228 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Ankele} et al., Lect. Notes Comput. Sci. 10355, 208--228 (2017; Zbl 1521.94024) Full Text: DOI
Bellini, Emanuele; Morgari, Guglielmo; Coppola, Marco An extension of Cook’s elasti cipher. (English) Zbl 1495.94043 J. Discrete Math. Sci. Cryptography 20, No. 5, 1151-1171 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Bellini} et al., J. Discrete Math. Sci. Cryptography 20, No. 5, 1151--1171 (2017; Zbl 1495.94043) Full Text: DOI
Barak, Boaz The complexity of public-key cryptography. (English) Zbl 1512.94062 Lindell, Yehuda (ed.), Tutorials on the foundations of cryptography. Dedicated to Oded Goldreich. Cham: Springer. Inf. Secur. Cryptogr., 45-77 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Barak}, in: Tutorials on the foundations of cryptography. Dedicated to Oded Goldreich. Cham: Springer. 45--77 (2017; Zbl 1512.94062) Full Text: DOI
Nesterenko, A. Yu. A new authenticated encryption mode for arbitrary block cipher based on universal hash function. (English) Zbl 1475.94142 Mat. Vopr. Kriptografii 8, No. 2, 117-130 (2017). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Yu. Nesterenko}, Mat. Vopr. Kriptografii 8, No. 2, 117--130 (2017; Zbl 1475.94142) Full Text: DOI MNR
Burov, D. A.; Pogorelov, B. A. The influence of linear mapping reducibility on the choice of round constants. (Russian. English summary) Zbl 1475.94108 Mat. Vopr. Kriptografii 8, No. 2, 51-64 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{D. A. Burov} and \textit{B. A. Pogorelov}, Mat. Vopr. Kriptografii 8, No. 2, 51--64 (2017; Zbl 1475.94108) Full Text: DOI MNR
Ahmetzyanova, L. R.; Alekseev, E. K.; Oshkin, I. B.; Smyshlyaev, S. V.; Sonina, L. A. On the properties of the CTR encryption mode of Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro key meshing. (English) Zbl 1475.94092 Mat. Vopr. Kriptografii 8, No. 2, 39-50 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{L. R. Ahmetzyanova} et al., Mat. Vopr. Kriptografii 8, No. 2, 39--50 (2017; Zbl 1475.94092) Full Text: DOI MNR
Pogorelov, B. A.; Pudovkina, M. A. Partitions on bigrams and Markov property of block ciphers. (Russian. English summary) Zbl 1475.94150 Mat. Vopr. Kriptografii 8, No. 1, 107-142 (2017). MSC: 94A60 60J10 PDFBibTeX XMLCite \textit{B. A. Pogorelov} and \textit{M. A. Pudovkina}, Mat. Vopr. Kriptografii 8, No. 1, 107--142 (2017; Zbl 1475.94150) Full Text: DOI MNR
Nguyen Bui Cuong; Nguyen Van Long; Hoang Dinh Linh Analyzing the influence of linear redundancy in S-boxes on the affine equivalence within XSL-like round functions. (English) Zbl 1475.94143 Mat. Vopr. Kriptografii 8, No. 1, 51-68 (2017). MSC: 94A60 94D10 PDFBibTeX XMLCite \textit{Nguyen Bui Cuong} et al., Mat. Vopr. Kriptografii 8, No. 1, 51--68 (2017; Zbl 1475.94143) Full Text: DOI MNR
Banik, Subhadeep; Pandey, Sumit Kumar; Peyrin, Thomas; Sasaki, Yu; Sim, Siang Meng; Todo, Yosuke GIFT: a small present. Towards reaching the limit of lightweight encryption. (English) Zbl 1450.94026 Fischer, Wieland (ed.) et al., Cryptographic hardware and embedded systems – CHES 2017. 19th international conference, Taipei, Taiwan, September 25–28, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10529, 321-345 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Banik} et al., Lect. Notes Comput. Sci. 10529, 321--345 (2017; Zbl 1450.94026) Full Text: DOI
Goudarzi, Dahmun; Rivain, Matthieu; Vergnaud, Damien; Vivek, Srinivas Generalized polynomial decomposition for S-boxes with application to side-channel countermeasures. (English) Zbl 1450.94033 Fischer, Wieland (ed.) et al., Cryptographic hardware and embedded systems – CHES 2017. 19th international conference, Taipei, Taiwan, September 25–28, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10529, 154-171 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Goudarzi} et al., Lect. Notes Comput. Sci. 10529, 154--171 (2017; Zbl 1450.94033) Full Text: DOI
Kölbl, Stefan; Roy, Arnab A brief comparison of SIMON and SIMECK. (English) Zbl 1412.94187 Bogdanov, Andrey (ed.), Lightweight cryptography for security and privacy. 5th international workshop, LightSec 2016, Aksaray, Turkey, September 21–22, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10098, 69-88 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Kölbl} and \textit{A. Roy}, Lect. Notes Comput. Sci. 10098, 69--88 (2017; Zbl 1412.94187) Full Text: DOI Link
Çoban, Mustafa; Karakoç, Ferhat; Özen, Mehmet Cryptanalysis of QTL block cipher. (English) Zbl 1412.94165 Bogdanov, Andrey (ed.), Lightweight cryptography for security and privacy. 5th international workshop, LightSec 2016, Aksaray, Turkey, September 21–22, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10098, 60-68 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Çoban} et al., Lect. Notes Comput. Sci. 10098, 60--68 (2017; Zbl 1412.94165) Full Text: DOI
Tezcan, Cihangir; Okan, Galip Oral; Şenol, Asuman; Doğan, Erol; Yücebaş, Furkan; Baykal, Nazife Differential attacks on lightweight block ciphers PRESENT, PRIDE, and RECTANGLE revisited. (English) Zbl 1412.94216 Bogdanov, Andrey (ed.), Lightweight cryptography for security and privacy. 5th international workshop, LightSec 2016, Aksaray, Turkey, September 21–22, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10098, 18-32 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Tezcan} et al., Lect. Notes Comput. Sci. 10098, 18--32 (2017; Zbl 1412.94216) Full Text: DOI
Rasoolzadeh, Shahram; Raddum, Håvard Faster key recovery attack on round-reduced PRINCE. (English) Zbl 1412.94202 Bogdanov, Andrey (ed.), Lightweight cryptography for security and privacy. 5th international workshop, LightSec 2016, Aksaray, Turkey, September 21–22, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10098, 3-17 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Rasoolzadeh} and \textit{H. Raddum}, Lect. Notes Comput. Sci. 10098, 3--17 (2017; Zbl 1412.94202) Full Text: DOI
Kondo, Kota; Sasaki, Yu; Todo, Yosuke; Iwata, Tetsu Analyzing key schedule of Simon: iterative key differences and application to related-key impossible differentials. (English) Zbl 1398.94129 Obana, Satoshi (ed.) et al., Advances in information and computer security. 12th international workshop on security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-64199-7/pbk; 978-3-319-64200-0/ebook). Lecture Notes in Computer Science 10418, 141-158 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kondo} et al., Lect. Notes Comput. Sci. 10418, 141--158 (2017; Zbl 1398.94129) Full Text: DOI
Chen, Jiazhe; Li, Hexin; Wang, Beibei Improved chosen-plaintext DPA on block cipher SM4. (Chinese. English summary) Zbl 1413.68043 J. Tsinghua Univ., Sci. Technol. 57, No. 11, 1134-1138 (2017). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. Chen} et al., J. Tsinghua Univ., Sci. Technol. 57, No. 11, 1134--1138 (2017; Zbl 1413.68043) Full Text: DOI
Chen, Hao; Wang, Tao; Zhao, Xinjie; Zhang, Fan; Ma, Yunfei; Wang, Xiaohan Research on fault-tolerant algebraic fault attack on HIGHT. (Chinese. English summary) Zbl 1399.94070 J. Nanjing Univ., Nat. Sci. 53, No. 6, 1141-1152 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Chen} et al., J. Nanjing Univ., Nat. Sci. 53, No. 6, 1141--1152 (2017; Zbl 1399.94070) Full Text: DOI
Ma, Yunfei; Wang, Tao; Chen, Hao; Zhang, Fan; Lou, Xiaoxuan; Xu, Lumin; Yang, Wenbing Fault-cube attack on SIMON family of lightweight block ciphers. (Chinese. English summary) Zbl 1399.94075 J. Zhejiang Univ., Eng. Sci. 51, No. 9, 1770-1779 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Ma} et al., J. Zhejiang Univ., Eng. Sci. 51, No. 9, 1770--1779 (2017; Zbl 1399.94075) Full Text: DOI
Vivek, Srinivas Revisiting a masked lookup-table compression scheme. (English) Zbl 1421.94074 Patra, Arpita (ed.) et al., Progress in cryptology – INDOCRYPT 2017. 18th international conference on cryptology in India, Chennai, India, December 10–13, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10698, 369-383 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Vivek}, Lect. Notes Comput. Sci. 10698, 369--383 (2017; Zbl 1421.94074) Full Text: DOI