default search action
IACR Transactions on Symmetric Cryptology, Volume 2022
Volume 2022, Number 1, 2022
- Itai Dinur, Bart Mennink:
Preface to Volume 2022, Issue 1. 1-4
- Lorenzo Grassi, Dmitry Khovratovich, Sondre Rønjom, Markus Schofnegger:
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp Preimage Attack on Full Grendel. 5-37 - Gregor Leander, Shahram Rasoolzadeh:
Weak Tweak-Keys for the CRAFT Block Cipher. 38-63 - Johannes Erlacher, Florian Mendel, Maria Eichlseder:
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis. 64-87 - Andreas B. Kidmose, Tyge Tiessen:
A Formal Analysis of Boomerang Probabilities. 88-109 - Carlos Cid, Lorenzo Grassi, Aldo Gunsing, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Influence of the Linear Layer on the Algebraic Degree in SP-Networks. 110-137 - Mustafa Khairallah:
Security of COFB against Chosen Ciphertext Attacks. 138-157 - Qun Liu, Weijia Wang, Yanhong Fan, Lixuan Wu, Ling Sun, Meiqin Wang:
Towards Low-Latency Implementation of Linear Layers. 158-182 - Alexander May, Lars Schlieper:
Quantum Period Finding is Compression Robust. 183-211 - Ling Sun, Wei Wang, Meiqin Wang:
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. 212-219
Volume 2022, Number 2, 2022
- Matthias Hamann, Alexander Moch, Matthias Krause, Vasily Mikhalev:
The DRACO Stream Cipher A Power-efficient Small-state Stream Cipher with Full Provable Security against TMDTO Attacks. 1-42 - Navid Ghaedi Bardeh, Vincent Rijmen:
New Key-Recovery Attack on Reduced-Round AES. 43-62 - Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang:
Improved MITM Cryptanalysis on Streebog. 63-91 - Hosein Hadipour, Maria Eichlseder:
Integral Cryptanalysis of WARP based on Monomial Prediction. 92-112 - Virginie Lallemand, Marine Minier, Loïc Rouquette:
Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP. 113-140 - Tim Beyne, Yunwen Liu:
Truncated Differential Attacks on Contracting Feistel Ciphers. 141-160 - Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang:
Revisiting the Extension of Matsui's Algorithm 1 to Linear Hulls: Application to TinyJAMBU. 161-200 - Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Accelerating the Best Trail Search on AES-Like Ciphers. 201-252 - Alireza Mehrdad, Silvia Mella, Lorenzo Grassi, Joan Daemen:
Differential Trail Search in Cryptographic Primitives with Big-Circle Chi: Application to Subterranean. 253-288 - Patrick Derbez, Baptiste Lambin:
Fast MILP Models for Division Property. 289-321 - Zhaocun Zhou, Dengguo Feng, Bin Zhang:
Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a. 322-350 - Qun Liu, Weijia Wang, Ling Sun, Yanhong Fan, Lixuan Wu, Meiqin Wang:
More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs. 351-378 - Varun Maram, Daniel Masny, Sikhar Patranabis, Srinivasan Raghuraman:
On the Quantum Security of OCB. 379-414
Volume 2022, Number 3, 2022
- Gianluca Brian, Antonio Faonio, João Ribeiro, Daniele Venturi:
Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited. 1-19 - Lorenzo Grassi, Silvia Onofri, Marco Pedicini, Luca Sozzi:
Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over Fnp Application to Poseidon. 20-72 - Augustin Bariant, Clémence Bouvier, Gaëtan Leurent, Léo Perrin:
Algebraic Attacks against Some Arithmetization-Oriented Primitives. 73-101 - Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe:
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting. 102-122 - Akinori Hosoyamada, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Minematsu, Ferdinand Sibleyras, Yosuke Todo:
Cryptanalysis of Rocca and Feasibility of Its Security Claim. 123-151 - Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe:
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences. 152-190 - Thomas Johansson, Willi Meier, Vu Nguyen:
Attacks on the Firekite Cipher. 191-216 - Marcus Dansarie, Patrick Derbez, Gregor Leander, Lukas Stennes:
Breaking HALFLOOP-24. 217-238 - Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov:
Finding Collisions against 4-Round SHA-3-384 in Practical Time. 239-270 - Hosein Hadipour, Marcel Nageler, Maria Eichlseder:
Throwing Boomerangs into Feistel Structures Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE. 271-302 - Rusydi H. Makarim, Raghvendra Rohit:
Towards Tight Differential Bounds of Ascon A Hybrid Usage of SMT and MILP. 303-340 - Ting Li, Yao Sun:
SuperBall: A New Approach for MILP Modelings of Boolean Functions. 341-367 - Yosuke Todo, Takanori Isobe:
Hybrid Code Lifting on Space-Hard Block Ciphers Application to Yoroi and SPNbox. 368-402 - Shahram Rasoolzadeh:
Low-Latency Boolean Functions and Bijective S-boxes. 403-447
Volume 2022, Number 4, 2022
- Fabio Banfi:
SCB Mode: Semantically Secure Length-Preserving Encryption. 1-23 - Kazuki Nakaya, Tetsu Iwata:
Generalized Feistel Structures Based on Tweakable Block Ciphers. 24-91 - Subhadeep Banik:
Cryptanalysis of Draco. 92-104 - Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi:
Practical Attacks on Full-round FRIET. 105-119 - Jules Baudrin, Anne Canteaut, Léo Perrin:
Practical Cube Attack against Nonce-Misused Ascon. 120-144 - Solane El Hirch, Silvia Mella, Alireza Mehrdad, Joan Daemen:
Improved Differential and Linear Trail Bounds for ASCON. 145-178 - Thomas Peyrin, Quan Quan Tan:
Mind Your Path: On (Key) Dependencies in Differential Characteristics. 179-207 - Qianqian Yang, Ling Song, Siwei Sun, Danping Shi, Lei Hu:
New Properties of the Double Boomerang Connectivity Table. 208-242 - Christof Beierle, Patrick Felke, Gregor Leander, Sondre Rønjom:
Decomposing Linear Layers. 243-265 - Ayineedi Venkateswarlu, Abhishek Kesarwani, Sumanta Sarkar:
On the Lower Bound of Cost of MDS Matrices. 266-290 - Sayandeep Saha, Mustafa Khairallah, Thomas Peyrin:
Exploring Integrity of AEADs with Faults: Definitions and Constructions. 291-324
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.