


default search action
IACR Transactions on Symmetric Cryptology, Volume 2020
Volume 2020, Number 1, 2020
- Gaëtan Leurent, Yu Sasaki:

Preface to Volume 2020, Issue 1. 1-5 - Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert

:
Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction. 6-42 - Tetsu Iwata, Mustafa Khairallah

, Kazuhiko Minematsu, Thomas Peyrin
:
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. 43-120 - Bertram Poettering, Paul Rösler

:
Combiners for AEAD. 121-143 - Begül Bilgin

, Lauren De Meyer, Sébastien Duval
, Itamar Levi, François-Xavier Standaert
:
Low AND Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking. 144-184 - Subhadeep Banik

, Fatih Balli, Francesco Regazzoni
, Serge Vaudenay:
Swap and Rotate: Lightweight Linear Layers for SPN-based Blockciphers. 185-232 - Augustin Bariant, Nicolas David, Gaëtan Leurent:

Cryptanalysis of Forkciphers. 233-265 - Jing Yang, Thomas Johansson

, Alexander Maximov:
Spectral analysis of ZUC-256. 266-288 - Christoph Dobraunig

, Yann Rotella, Jan Schoone:
Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96. 289-312 - Ward Beullens, Tim Beyne

, Aleksei Udovenko
, Giuseppe Vitto:
Cryptanalysis of the Legendre PRF and Generalizations. 313-330 - Hamid Boukerrou, Paul Huynh

, Virginie Lallemand, Bimal Mandal, Marine Minier:
On the Feistel Counterpart of the Boomerang Connectivity Table Introduction and Analysis of the FBCT. 331-362 - Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo

, Qingju Wang
:
Links between Division Property and Other Cube Attack Variants. 363-395 - Kai Hu

, Qingju Wang
, Meiqin Wang:
Finding Bit-Based Division Property for Ciphers with Complex Linear Layers. 396-424 - Yaobin Shen, Chun Guo, Lei Wang:

Improved Security Bounds for Generalized Feistel Networks. 425-457
Volume 2020, Number S1, 2020
- Itai Dinur, Gaëtan Leurent:

Preface to Volume 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process. 1-4 - Tim Beyne

, Yu Long Chen, Christoph Dobraunig
, Bart Mennink:
Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus. 5-30 - Dahmun Goudarzi, Jérémy Jean, Stefan Kölbl, Thomas Peyrin

, Matthieu Rivain, Yu Sasaki, Siang Meng Sim
:
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation. 31-59 - Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer:

Xoodyak, a lightweight cryptographic scheme. 60-87 - Christof Beierle

, Jérémy Jean, Stefan Kölbl, Gregor Leander
, Amir Moradi
, Thomas Peyrin
, Yu Sasaki, Pascal Sasdrich
, Siang Meng Sim
:
SKINNY-AEAD and SKINNY-Hash. 88-131 - Riham AlTawy, Guang Gong, Kalikinkar Mandal, Raghvendra Rohit:

WAGE: An Authenticated Encryption with a Twist. 132-159 - Anne Canteaut, Sébastien Duval

, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Thomas Pornin, André Schrottenloher:
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security. 160-207 - Christof Beierle

, Alex Biryukov
, Luan Cardoso dos Santos, Johann Großschädl, Léo Perrin, Aleksei Udovenko
, Vesselin Velichkov, Qingju Wang
:
Lightweight AEAD and Hashing using the Sparkle Permutation Family. 208-261 - Joan Daemen, Pedro Maat Costa Massolino, Alireza Mehrdad, Yann Rotella:

The Subterranean 2.0 Cipher Suite. 262-294 - Davide Bellizia

, Francesco Berti, Olivier Bronchain, Gaëtan Cassiers, Sébastien Duval
, Chun Guo, Gregor Leander
, Gaëtan Leurent, Itamar Levi, Charles Momin, Olivier Pereira, Thomas Peters, François-Xavier Standaert
, Balazs Udvarhelyi, Friedrich Wiemer
:
Spook: Sponge-Based Leakage-Resistant Authenticated Encryption with a Masked Tweakable Block Cipher. 295-349 - Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki:

ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode. 350-389 - Christoph Dobraunig

, Maria Eichlseder
, Stefan Mangard
, Florian Mendel
, Bart Mennink, Robert Primas, Thomas Unterluggauer:
Isap v2.0. 390-416 - Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Snehal Mitragotri, Mridul Nandi:

From Combined to Hybrid: Making Feedback-based AE even Smaller. 417-445
Volume 2020, Number 2, 2020
- Avik Chakraborti, Mridul Nandi, Suprita Talnikar

, Kan Yasuda:
On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security. 1-39 - Jeroen Pijnenburg, Bertram Poettering:

Key Assignment Schemes with Authenticated Encryption, revisited. 40-67 - Ryota Nakamichi, Tetsu Iwata:

Beyond-Birthday-Bound Secure Cryptographic Permutations from Ideal Ciphers with Long Keys. 68-92 - Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi:

On the Security of Sponge-type Authenticated Encryption Modes. 93-119 - Zejun Xiang

, Xiangyong Zeng, Da Lin, Zhenzhen Bao
, Shasha Zhang:
Optimizing Implementations of Linear Layers. 120-145
Volume 2020, Number 3, 2020
- Abdelrahaman Aly, Tomer Ashur

, Eli Ben-Sasson, Siemen Dhooghe
, Alan Szepieniec:
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols. 1-45 - Phil Hebborn, Gregor Leander:

Dasta - Alternative Linear Layer for Rasta. 46-86 - Kazuhiko Minematsu:

Fast Decryption: a New Feature of Misuse-Resistant AE. 87-118 - Hao Guo, Siwei Sun, Danping Shi, Ling Sun, Yao Sun, Lei Hu, Meiqin Wang:

Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. 119-151 - Dhiman Saha

, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang
:
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. 152-174 - Charles Bouillaguet

, Florette Martinez, Julia Sauvage:
Practical seed-recovery for the PCG Pseudo-Random Number Generator. 175-196 - Zhenzhen Bao

, Jian Guo, Eik List:
Extended Truncated-differential Distinguishers on Round-reduced AES. 197-261 - Ling Sun, David Gérault, Wei Wang, Meiqin Wang:

On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers. 262-287 - Senpeng Wang, Bin Hu, Jie Guan, Kai Zhang

, Tairong Shi:
Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property. 288-304 - Yuan Gao, Chun Guo, Meiqin Wang, Weijia Wang, Jiejing Wen:

Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks. 305-326 - Christina Boura, Daniel Coggia:

Efficient MILP Modelings for Sboxes and Linear Layers of SPN ciphers. 327-361 - Aldo Gunsing, Joan Daemen, Bart Mennink:

Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers. 362-366 - Ethan Heilman, Neha Narula, Garrett Tanzer, James Lovejoy, Michael Colavita, Madars Virza, Tadge Dryja:

Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency. 367-391
Volume 2020, Number 4, 2020
- Yusuke Naito, Yu Sasaki, Takeshi Sugawara

:
LM-DAE: Low-Memory Deterministic Authenticated Encryption for 128-bit Security. 1-38 - Wonseok Choi, Akiko Inoue, ByeongHak Lee, Jooyoung Lee, Eik List, Kazuhiko Minematsu, Yusuke Naito:

Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers. 39-70 - Hwigyeom Kim, Yeongmin Lee, Jooyoung Lee:

Forking Tweakable Even-Mansour Ciphers. 71-87 - Patrick Derbez

, Pierre-Alain Fouque
, Victor Mollimard:
Fake Near Collisions Attacks. 88-103 - Stéphanie Delaune, Patrick Derbez

, Mathieu Vavrille:
Catching the Fastest Boomerangs Application to SKINNY. 104-129 - Subhadeep Banik

, Khashayar Barooti, F. Betül Durak, Serge Vaudenay:
Cryptanalysis of LowMC instances using single plaintext/ciphertext pair. 130-146 - Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki:

Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers. 147-172 - Patrick Derbez

, Pierre-Alain Fouque
:
Increasing Precision of Division Property. 173-194 - Christoph Dobraunig

, Bart Mennink:
Tightness of the Suffix Keyed Sponge Bound. 195-212

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














