default search action
IACR Transactions on Symmetric Cryptology, Volume 2017
Volume 2017, Number 1, 2017
- María Naya-Plasencia, Bart Preneel:
Preface. 1-3 - Roberto Avanzi:
The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes. 4-44 - Matthias Hamann, Matthias Krause, Willi Meier:
LIZARD - A Lightweight Stream Cipher for Power-constrained Devices. 45-79 - Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Thomas Unterluggauer:
ISAP - Towards Side-Channel Secure Authenticated Encryption. 80-105 - Debrup Chakraborty, Sebati Ghosh, Palash Sarkar:
A Fast Single-Key Two-Level Universal Hash Function. 106-128 - Chaoyun Li, Qingju Wang:
Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices. 129-155 - Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jérémy Jean, Jean-René Reinhard:
Cryptanalysis of NORX v2.0. 156-174 - Zheng Li, Xiaoyang Dong, Xiaoyun Wang:
Conditional Cube Attack on Round-Reduced ASCON. 175-202 - Tomer Ashur, Achiya Bar-On, Orr Dunkelman:
Cryptanalysis of GOST2. 203-214 - Li Lin, Wenling Wu:
Meet-in-the-Middle Attacks on Reduced-Round Midori64. 215-239 - Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3. 240-258 - Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin:
Cube-like Attack on Round-Reduced Initialization of Ketje Sr. 259-280 - Siwei Sun, David Gérault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:
Analysis of AES, SKINNY, and Others with Constraint Programming. 281-306 - Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Martin Bjerregaard Jepsen:
Analysis of Software Countermeasures for Whitebox Encryption. 307-328 - Silvia Mella, Joan Daemen, Gilles Van Assche:
New techniques for trail bounds and application to differential trails in Keccak. 329-357 - Zhengbin Liu, Yongqiang Li, Mingsheng Wang:
Optimal Differential Trails in SIMON-like Ciphers. 358-379 - Leif Both, Alexander May:
The Approximate k-List Problem. 380-397 - Dusan Bozilov, Begül Bilgin, Haci Ali Sahin:
A Note on 5-bit Quadratic Permutations' Classification. 398-404 - Giorgia Azzurra Marson, Bertram Poettering:
Security Notions for Bidirectional Channels. 405-426 - Ashwin Jha, Avradip Mandal, Mridul Nandi:
On The Exact Security of Message Authentication Using Pseudorandom Functions. 427-448 - Pooya Farshim, Claudio Orlandi, Razvan Rosie:
Security of Symmetric Primitives under Incorrect Usage of Keys. 449-473 - Thorsten Kranz, Gregor Leander, Friedrich Wiemer:
Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers. 474-505 - Sylvain Ruhault:
SoK: Security Models for Pseudo-Random Number Generators. 506-544
Volume 2017, Number 2, 2017
- Yusuke Naito:
Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security. 1-26 - Benoît Cogliati, Jooyoung Lee, Yannick Seurin:
New Constructions of MACs from (Tweakable) Block Ciphers. 27-58 - Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim:
Human-readable Proof of the Related-Key Security of AES-128. 59-83 - Pooya Farshim, Louiza Khati, Damien Vergnaud:
Security of Even-Mansour Ciphers under Key-Dependent Messages. 84-104 - Elena Andreeva, Guy Barwell, Ritam Bhaumik, Mridul Nandi, Dan Page, Martijn Stam:
Turning Online Ciphers Off. 105-142 - Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi:
Understanding RUP Integrity of COLM. 143-161 - Kazuhiko Minematsu, Tetsu Iwata:
Cryptanalysis of PMACx, PMAC2x, and SIVx. 162-176 - Gaoli Wang, Yanzhao Shen, Fukang Liu:
Cryptanalysis of 48-step RIPEMD-160. 177-202 - Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens:
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds. 203-227 - Shihui Fu, Xiutao Feng, Baofeng Wu:
Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies. 228-249
Volume 2017, Number 3, 2017
- Victor Cauchois, Clément Gomez, Reynald Lercier:
Grøstl Distinguishing Attack: A New Rebound Attack of an AES-like Permutation. 1-23 - Yunwen Liu, Glenn De Witte, Adrián Ranea, Tomer Ashur:
Rotational-XOR Cryptanalysis of Reduced-round SPECK. 24-36 - Guozhen Liu, Mohona Ghosh, Ling Song:
Security Analysis of SKINNY under Related-Tweakey Settings (Long Paper). 37-72 - Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers. 73-107 - Shivam Bhasin, Dirmanto Jap, Thomas Peyrin:
Practical Evaluation of FSE 2016 Customized Encoding Countermeasure. 108-129 - Avijit Dutta, Ashwin Jha, Mridul Nandi:
Tight Security Analysis of EHtM MAC. 130-150 - Shuangyi Zhu, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing:
Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources. 151-168 - Céline Blondeau:
Accurate Estimate of the Advantage of Impossible Differential Attacks. 169-191 - Claude Carlet, Pierrick Méaux, Yann Rotella:
Boolean functions with restricted input and their robustness; application to the FLIP cipher. 192-227 - Bart Mennink, Samuel Neves:
Optimal PRFs from Blockcipher Designs. 228-252 - Yu Long Chen, Atul Luykx, Bart Mennink, Bart Preneel:
Efficient Length Doubling From Tweakable Block Ciphers. 253-270 - Francesco Berti, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
On Leakage-Resilient Authenticated Encryption with Decryption Leakages. 271-293 - Dragos Rotaru, Nigel P. Smart, Martijn Stam:
Modes of Operation Suitable for Computing on Encrypted Data. 294-324
Volume 2017, Number 4, 2017
- Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer:
Farfalle: parallel permutation-based cryptography. 1-38 - Ting Li, Yao Sun, Maodong Liao, Dingkang Wang:
Preimage Attacks on the Round-reduced Keccak with Cross-linear Structures. 39-57 - Bin Zhang, Xinxin Gong, Willi Meier:
Fast Correlation Attacks on Grain-like Small State Stream Ciphers. 58-81 - Subhadeep Banik, Takanori Isobe, Tingting Cui, Jian Guo:
Some cryptanalytic results on Lizard. 82-98 - Ahmed Abdelkhalek, Yu Sasaki, Yosuke Todo, Mohamed Tolba, Amr M. Youssef:
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics. 99-129 - Jérémy Jean, Thomas Peyrin, Siang Meng Sim, Jade Tourteaux:
Optimizing Implementations of Lightweight Building Blocks. 130-168 - Zhiyuan Guo, Renzhang Liu, Si Gao, Wenling Wu, Dongdai Lin:
Direct Construction of Optimal Rotational-XOR Diffusion Primitives. 169-187 - Thorsten Kranz, Gregor Leander, Ko Stoffelen, Friedrich Wiemer:
Shorter Linear Straight-Line Programs for MDS Matrices. 188-211 - Kevin Atighehchi, Alexis Bonnecaze:
Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3. 212-239 - Tetsu Iwata, Yannick Seurin:
Reconsidering the Security Bound of AES-GCM-SIV. 240-267 - Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang:
Single Key Variant of PMAC_Plus. 268-305 - Eik List, Mridul Nandi:
ZMAC+ - An Efficient Variable-output-length Variant of ZMAC. 306-325
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.