×

Found 350 Documents (Results 1–100)

Quantum linear key-recovery attacks using the QFT. (English) Zbl 07800235

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part V. Cham: Springer. Lect. Notes Comput. Sci. 14085, 258-291 (2023).
MSC:  81P94 94A60
PDFBibTeX XMLCite
Full Text: DOI

On perfect linear approximations and differentials over two-round SPNs. (English) Zbl 07799257

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 209-239 (2023).
MSC:  94A60 68W05
PDFBibTeX XMLCite
Full Text: DOI

Fully automated differential-linear attacks against ARX ciphers. (English) Zbl 1522.94038

Rosulek, Mike (ed.), Topics in cryptology – CT-RSA 2023. Cryptographers’ track at the RSA conference 2023, San Francisco, CA, USA, April 24–27, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13871, 252-276 (2023).
MSC:  94A60 90C11 90C05
PDFBibTeX XMLCite
Full Text: DOI

Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró. (English) Zbl 1519.94096

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13791, 256-286 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Clustering effect of iterative differential and linear trails. (English) Zbl 1519.94105

Deng, Yi (ed.) et al., Information security and cryptology. 18th International conference, Inscrypt 2022, Beijing, China, December 11–13, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13837, 252-271 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Optimising linear key recovery attacks with affine Walsh transform pruning. (English) Zbl 1519.94119

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13794, 447-476 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Improved division property for ciphers with complex linear layers. (English) Zbl 1527.94054

Nguyen, Khoa (ed.) et al., Information security and privacy. 27th Australasian conference, ACISP 2022, Wollongong, NSW, Australia, November 28–30, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13494, 106-124 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved differential-linear attack with application to round-reduced Speck32/64. (English) Zbl 1512.94101

Ateniese, Giuseppe (ed.) et al., Applied cryptography and network security. 20th international conference, ACNS 2022, Rome, Italy, June 20–23, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13269, 792-808 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Classification of Hadamard products of one-codimensional subcodes of Reed-Muller codes. (English. Russian original) Zbl 1512.94124

Discrete Math. Appl. 32, No. 5, 297-311 (2022); translation from Diskretn. Mat. 32, No. 1, 115-134 (2020).
MSC:  94B05 94A60
PDFBibTeX XMLCite
Full Text: DOI

Information-combining differential fault attacks on DEFAULT. (English) Zbl 1497.94108

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13277, 168-191 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A correlation attack on full SNOW-V and SNOW-Vi. (English) Zbl 1496.94064

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13277, 34-56 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New attacks from old distinguishers improved attacks on serpent. (English) Zbl 1492.94070

Galbraith, Steven D. (ed.), Topics in cryptology – CT-RSA 2022. Cryptographers’ track at the RSA conference 2022, virtual event, March 1–2, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13161, 484-510 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Clustering effect in Simon and Simeck. (English) Zbl 1514.94113

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 272-302 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A geometric approach to linear cryptanalysis. (English) Zbl 1514.94042

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 36-66 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Automatic key recovery of Feistel ciphers: application to SIMON and SIMECK. (English) Zbl 1504.94200

Deng, Robert (ed.) et al., Information security practice and experience. 16th international conference, ISPEC 2021, Nanjing, China, December 17–19, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13107, 147-167 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT. (English) Zbl 1492.94170

Yu, Yu (ed.) et al., Information security and cryptology. 17th international conference, Inscrypt 2021, virtual event, August 12–14, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13007, 171-190 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential-linear cryptanalysis from an algebraic perspective. (English) Zbl 1486.94125

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 247-277 (2021).
MSC:  94A60 94A55
PDFBibTeX XMLCite
Full Text: DOI

Linear cryptanalysis of FF3-1 and FEA. (English) Zbl 1485.94058

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12825, 41-69 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Can a differential attack work for an arbitrarily large number of rounds? (English) Zbl 07497445

Hong, Deukjo (ed.), Information security and cryptology – ICISC 2020. 23rd international conference, Seoul, South Korea, December 2–4, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12593, 157-181 (2021).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys. (English) Zbl 1479.94238

Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 126-147 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced FRIET, Xoodoo, and Alzette. (English) Zbl 1479.94225

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12696, 741-770 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved linear approximations to ARX ciphers and attacks against ChaCha. (English) Zbl 1479.94150

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12696, 711-740 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of masked ciphers: a not so random idea. (English) Zbl 1511.94056

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 817-850 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions. (English) Zbl 1511.94100

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 33-63 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Generalized Matsui Algorithm 1 with application for the full DES. (English) Zbl 1506.94021

Galdi, Clemente (ed.) et al., Security and cryptography for networks. 12th international conference, SCN 2020, Amalfi, Italy, September 14–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12238, 448-467 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Improving key-recovery in linear attacks: application to 28-round PRESENT. (English) Zbl 1479.94172

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 221-249 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Simultaneous diagonalization of incomplete matrices and applications. (English) Zbl 1475.15011

Galbraith, Steven D. (ed.), ANTS XIV. Proceedings of the fourteenth algorithmic number theory symposium, Auckland, New Zealand, virtual event, June 29 – July 4, 2020. Berkeley, CA: Mathematical Sciences Publishers (MSP). Open Book Ser. 4, 127-142 (2020).
PDFBibTeX XMLCite
Full Text: DOI arXiv

On the design of bit permutation based ciphers. The interplay among S-box, bit permutation and key-addition. (English) Zbl 1471.68041

Aoki, Kazumaro (ed.) et al., Advances in information and computer security. 15th international workshop on security, IWSEC 2020, Fukui, Japan, September 2–4, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12231, 3-22 (2020).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

On the decipherment of Sidel’nikov-type cryptosystems. (English) Zbl 1459.94107

Baldi, Marco (ed.) et al., Code-based cryptography. 8th international workshop, CBC 2020, Zagreb, Croatia, May 9–10, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12087, 20-40 (2020).
PDFBibTeX XMLCite
Full Text: DOI

A general framework for the related-key linear attack against block ciphers with linear key schedules. (English) Zbl 1453.94096

Paterson, Kenneth G. (ed.) et al., Selected areas in cryptography – SAC 2019. 26th international conference, Waterloo, ON, Canada, August 12–16, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11959, 194-224 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Systematic construction of nonlinear product attacks on block ciphers. (English) Zbl 1457.94116

Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 20-51 (2020).
MSC:  94A60 11T71 94D10
PDFBibTeX XMLCite
Full Text: DOI Link

Improved automatic search algorithm for differential and linear cryptanalysis on SIMECK and the applications. (English) Zbl 1458.94243

Naccache, David (ed.) et al., Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11149, 664-681 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Using MILP in analysis of Feistel structures and improving type II GFS by switching mechanism. (English) Zbl 1407.94150

Chakraborty, Debrup (ed.) et al., Progress in cryptology – INDOCRYPT 2018. 19th international conference on cryptology in India, New Delhi, India, December 9–12, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11356, 265-281 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of MORUS. (English) Zbl 1446.94095

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 35-64 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Block cipher invariants as eigenvectors of correlation matrices. (English) Zbl 1446.94102

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 3-31 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT. (English) Zbl 1398.94157

Inomata, Atsuo (ed.) et al., Advances in information and computer security. 13th international workshop on security, IWSEC 2018, Sendai, Japan, September 3–5, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-97915-1/pbk; 978-3-319-97916-8/ebook). Lecture Notes in Computer Science 11049, 227-243 (2018).
MSC:  94A60 90C10
PDFBibTeX XMLCite
Full Text: DOI

Two-round iterative characteristics for linear cryptanalysis of modified DES with embedded parity checks. (English) Zbl 1439.94064

Kabatiansky, Grigory (ed.) et al., Algebraic and combinatorial coding theory – 2016. Selected papers from the 15th international workshop (ACCT-XV), Albena, Bulgaria, June 18–24, 2016. Amsterdam: Elsevier. Electron. Notes Discrete Math. 57, 205-210 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linear cryptanalysis of DES with asymmetries. (English) Zbl 1420.94039

Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10624, 187-216 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

LP solutions of vectorial integer subset sums – cryptanalysis of Galbraith’s binary matrix LWE. (English) Zbl 1404.94081

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-54364-1/pbk; 978-3-662-54365-8/ebook). Lecture Notes in Computer Science 10174, 3-15 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved integral and zero-correlation linear cryptanalysis of CLEFIA block cipher. (English) Zbl 1372.94445

Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 33-46 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved linear cryptanalysis of round-reduced ARIA. (English) Zbl 1397.94041

Bishop, Matt (ed.) et al., Information security. 19th international conference, ISC 2016, Honolulu, HI, USA, September 3–6, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-45870-0/pbk; 978-3-319-45871-7/ebook). Lecture Notes in Computer Science 9866, 18-34 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Automatic search for key-bridging technique: applications to LBlock and TWINE. (English) Zbl 1387.94089

Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 247-267 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Design strategies for ARX with provable bounds: Sparx and LAX. (English) Zbl 1384.94055

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 484-513 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On linear hulls and trails. (English) Zbl 1394.94927

Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-49889-8/pbk; 978-3-319-49890-4/ebook). Lecture Notes in Computer Science 10095, 269-286 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Cryptographic properties of a new national encryption standard of Ukraine. (English. Russian original) Zbl 1391.94722

Cybern. Syst. Anal. 52, No. 3, 351-364 (2016); translation from Kibern. Sist. Anal. 2016, No. 3, 16-31 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Automatic search of linear trails in ARX with applications to SPECK and Chaskey. (English) Zbl 1346.94112

Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 485-499 (2016).
MSC:  94A60 68Q25
PDFBibTeX XMLCite
Full Text: DOI Link

Improved differential-linear cryptanalysis of 7-round Chaskey with partitioning. (English) Zbl 1384.94079

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 344-371 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Linear hull attack on round-reduced Simeck with dynamic key-guessing techniques. (English) Zbl 1346.94121

Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 409-424 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software