


default search action
IACR Transactions on Symmetric Cryptology, Volume 2021
Volume 2021, Number 1, 2021
- Subhadeep Banik

, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar
:
Atom: A Stream Cipher with Double Key Filter. 5-36 - Subhadeep Banik

, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto:
Orthros: A Low-Latency PRF. 37-77 - Olivier Bronchain, Sebastian Faust, Virginie Lallemand, Gregor Leander

, Léo Perrin, François-Xavier Standaert
:
MOE: Multiplication Operated Encryption with Trojan Resilience. 78-129 - Raghvendra Rohit, Kai Hu, Sumanta Sarkar, Siwei Sun:

Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon. 130-155 - Rui Zong, Xiaoyang Dong, Huaifeng Chen, Yiyuan Luo, Si Wang, Zheng Li:

Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128. 156-184 - Fukang Liu, Takanori Isobe, Willi Meier:

Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks. 185-216 - Le He, Xiaoen Lin, Hongbo Yu:

Improved Preimage Attacks on 4-Round Keccak-224/256. 217-238 - Rachelle Heim Boissier, Camille Noûs, Yann Rotella:

Algebraic Collision Attacks on Keccak. 239-268 - Ling Sun, Wei Wang, Meiqin Wang

:
Accelerating the Search of Differential and Linear Characteristics with the SAT Method. 269-315 - Amit Kumar Chauhan, Abhishek Kumar, Somitra Kumar Sanadhya:

Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256. 316-336 - Akinori Hosoyamada, Tetsu Iwata:

Provably Quantum-Secure Tweakable Block Ciphers. 337-377 - Xinxin Gong, Bin Zhang:

Resistance of SNOW-V against Fast Correlation Attacks. 378-410 - Siwei Chen

, Zejun Xiang
, Xiangyong Zeng, Shasha Zhang:
On the Relationships between Different Methods for Degree Evaluation. 411-442
Volume 2021, Number 2, 2021
- Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe:

Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G. 1-30 - Avijit Dutta, Mridul Nandi, Suprita Talnikar

:
Permutation Based EDM: An Inverse Free BBB Secure PRF. 31-70 - Xinxin Gong, Bin Zhang:

Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Attacks. 71-103 - Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto:

Weak Keys in Reduced AEGIS and Tiaoxin. 104-139 - Hosein Hadipour

, Nasour Bagheri, Ling Song
:
Improved Rectangle Attacks on SKINNY and CRAFT. 140-198 - Ling Sun, Wei Wang, Meiqin Wang:

Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. 199-221 - Boyu Ni, Xiaoyang Dong, Keting Jia, Qidi You:

(Quantum) Collision Attacks on Reduced Simpira v2. 222-248 - Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu

:
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny. 249-291 - Nicky Mouha, Nikolay Kolomeec, Danil Akhtiamov

, Ivan Sutormin, Matvey Panferov, Kseniya Titova, Tatiana Bonich, Evgeniya Ishchukova, Natalia N. Tokareva, Bulat Zhantulikov:
Maximums of the Additive Differential Probability of Exclusive-Or. 292-313 - Lorenzo Grassi

, Christian Rechberger, Markus Schofnegger:
Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer. 314-352 - Chun Guo, François-Xavier Standaert, Weijia Wang

, Xiao Wang
, Yu Yu:
Provable Security of SP Networks with Partial Non-Linear Layers. 353-388 - Philip W. Hodges, Douglas Stebila

:
Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications. 389-422 - Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi:

On Length Independent Security Bounds for the PMAC Family. 423-445 - Emiljano Gjiriti, Reza Reyhanitabar, Damian Vizár:

Power Yoga: Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT. 446-468
Volume 2021, Number 3, 2021
- Elena Andreeva

, Amit Singh Bhati
, Bart Preneel, Damian Vizár:
1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher. 1-35 - Marcus Dansarie

:
Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment. 36-53 - Jing Yang, Thomas Johansson

, Alexander Maximov:
Improved guess-and-determine and distinguishing attacks on SNOW-V. 54-83 - Xiaoen Lin, Le He, Hongbo Yu:

Improved Preimage Attacks on 3-Round Keccak-224/256. 84-101 - David Gérault, Thomas Peyrin

, Quan Quan Tan
:
Exploring Differential-Based Distinguishers and Forgeries for ASCON. 102-136 - Mostafizar Rahman, Dhiman Saha

, Goutam Paul:
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. 137-169 - Zheng Yang

, Zhiting Bao, Chenglu Jin
, Zhe Liu, Jianying Zhou:
PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers. 170-217
Volume 2021, Number 4, 2021
- Benoît Cogliati, Jordan Ethan

, Virginie Lallemand, ByeongHak Lee, Jooyoung Lee, Marine Minier:
CTET+: A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom Permutation. 1-35 - Andrea Caforio, Subhadeep Banik

, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang:
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives. 36-73 - Raghvendra Rohit, Santanu Sarkar

:
Diving Deep into the Weak Keys of Round Reduced Ascon. 74-99 - Yao Sun:

Automatic Search of Cubes for Attacking Stream Ciphers. 100-123 - Kaisa Nyberg

:
Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis. 124-137 - Nilanjan Datta, Avijit Dutta, Kushankur Dutta:

Improved Security Bound of (E/D)WCDM. 138-176

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














