


default search action
IACR Transactions on Symmetric Cryptology, Volume 2016
Volume 2016, Number 1, 2016
- Jérémy Jean:

Cryptanalysis of Haraka. 1-12 - Xiaoyang Dong, Xiaoyun Wang:

Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. 13-32 - Jian Guo

, Jérémy Jean, Ivica Nikolic
, Kexin Qiao, Yu Sasaki, Siang Meng Sim
:
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs. 33-56 - Tomer Ashur

, Yunwen Liu:
Rotational Cryptanalysis in the Presence of Constants. 57-70 - Marc Kaplan

, Gaëtan Leurent
, Anthony Leverrier, María Naya-Plasencia:
Quantum Differential and Linear Cryptanalysis. 71-94 - Sumanta Sarkar, Habeeb Syed:

Lightweight Diffusion Layer: Importance of Toeplitz Matrices. 95-113 - Colin Chaigneau, Henri Gilbert:

Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks? 114-133 - Tetsu Iwata, Kazuhiko Minematsu:

Stronger Security Variants of GCM-SIV. 134-157 - Atul Luykx, Bart Mennink, Samuel Neves

:
Security Analysis of BLAKE2's Modes of Operation. 158-176
Volume 2016, Number 2, 2016
- Stefan Kölbl, Martin M. Lauridsen, Florian Mendel

, Christian Rechberger:
Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications. 1-29 - Ritam Bhaumik, Mridul Nandi:

OleF: an Inverse-Free Online Cipher. An Online SPRP with an Optimal Inverse-Free Construction. 30-51 - Vasily Mikhalev, Frederik Armknecht

, Christian Müller:
On Ciphers that Continuously Access the Non-Volatile Key. 52-79 - Victor Cauchois, Pierre Loidreau, Nabil Merkiche:

Direct construction of quasi-involutory recursive-like MDS matrices from 2-cyclic codes. 80-98 - Léo Perrin, Aleksei Udovenko

:
Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog. 99-124 - Guillaume Endignoux, Damian Vizár:

Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models. 125-144 - Peter Gazi, Krzysztof Pietrzak, Michal Rybár:

The Exact Security of PMAC. 145-161 - Céline Blondeau, Kaisa Nyberg

:
Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis. 162-191 - Lorenzo Grassi

, Christian Rechberger, Sondre Rønjom:
Subspace Trail Cryptanalysis and its Applications to AES. 192-225 - Alex Biryukov

, Dmitry Khovratovich, Léo Perrin:
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs. 226-247 - Christoph Dobraunig

, Maria Eichlseder
, Daniel Kales
, Florian Mendel
:
Practical Key-Recovery Attack on MANTIS5. 248-260 - Arka Rai Choudhuri

, Subhamoy Maitra:
Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha. 261-287 - Zhiyuan Guo, Wenling Wu, Renzhang Liu, Liting Zhang:

Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP. 288-306 - Jian Guo

, Jérémy Jean, Ivica Nikolic
, Yu Sasaki:
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. 307-337

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














