


default search action
IACR Transactions on Symmetric Cryptology, Volume 2022
Volume 2022, Number 1, 2022
- Itai Dinur, Bart Mennink:

Preface to Volume 2022, Issue 1. 1-4
- Lorenzo Grassi

, Dmitry Khovratovich, Sondre Rønjom, Markus Schofnegger:
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp Preimage Attack on Full Grendel. 5-37 - Gregor Leander

, Shahram Rasoolzadeh
:
Weak Tweak-Keys for the CRAFT Block Cipher. 38-63 - Johannes Erlacher, Florian Mendel

, Maria Eichlseder
:
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis. 64-87 - Andreas B. Kidmose

, Tyge Tiessen
:
A Formal Analysis of Boomerang Probabilities. 88-109 - Carlos Cid, Lorenzo Grassi

, Aldo Gunsing, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger:
Influence of the Linear Layer on the Algebraic Degree in SP-Networks. 110-137 - Mustafa Khairallah

:
Security of COFB against Chosen Ciphertext Attacks. 138-157 - Qun Liu, Weijia Wang

, Yanhong Fan
, Lixuan Wu, Ling Sun, Meiqin Wang
:
Towards Low-Latency Implementation of Linear Layers. 158-182 - Alexander May

, Lars Schlieper:
Quantum Period Finding is Compression Robust. 183-211 - Ling Sun, Wei Wang, Meiqin Wang

:
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives. 212-219
Volume 2022, Number 2, 2022
- Matthias Hamann, Alexander Moch, Matthias Krause, Vasily Mikhalev:

The DRACO Stream Cipher A Power-efficient Small-state Stream Cipher with Full Provable Security against TMDTO Attacks. 1-42 - Navid Ghaedi Bardeh

, Vincent Rijmen
:
New Key-Recovery Attack on Reduced-Round AES. 43-62 - Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang:

Improved MITM Cryptanalysis on Streebog. 63-91 - Hosein Hadipour

, Maria Eichlseder
:
Integral Cryptanalysis of WARP based on Monomial Prediction. 92-112 - Virginie Lallemand, Marine Minier, Loïc Rouquette:

Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP. 113-140 - Tim Beyne

, Yunwen Liu
:
Truncated Differential Attacks on Contracting Feistel Ciphers. 141-160 - Muzhou Li

, Nicky Mouha, Ling Sun, Meiqin Wang
:
Revisiting the Extension of Matsui's Algorithm 1 to Linear Hulls: Application to TinyJAMBU. 161-200 - Seonggyeom Kim

, Deukjo Hong, Jaechul Sung
, Seokhie Hong:
Accelerating the Best Trail Search on AES-Like Ciphers. 201-252 - Alireza Mehrdad

, Silvia Mella, Lorenzo Grassi
, Joan Daemen:
Differential Trail Search in Cryptographic Primitives with Big-Circle Chi: Application to Subterranean. 253-288 - Patrick Derbez

, Baptiste Lambin:
Fast MILP Models for Division Property. 289-321 - Zhaocun Zhou, Dengguo Feng, Bin Zhang:

Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a. 322-350 - Qun Liu, Weijia Wang, Ling Sun, Yanhong Fan

, Lixuan Wu, Meiqin Wang
:
More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs. 351-378 - Varun Maram

, Daniel Masny, Sikhar Patranabis, Srinivasan Raghuraman:
On the Quantum Security of OCB. 379-414
Volume 2022, Number 3, 2022
- Gianluca Brian

, Antonio Faonio
, João Ribeiro
, Daniele Venturi:
Short Non-Malleable Codes from Related-Key Secure Block Ciphers, Revisited. 1-19 - Lorenzo Grassi

, Silvia Onofri
, Marco Pedicini, Luca Sozzi:
Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over Fnp Application to Poseidon. 20-72 - Augustin Bariant, Clémence Bouvier, Gaëtan Leurent, Léo Perrin:

Algebraic Attacks against Some Arithmetization-Oriented Primitives. 73-101 - Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe:

New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting. 102-122 - Akinori Hosoyamada, Akiko Inoue, Ryoma Ito

, Tetsu Iwata, Kazuhiko Minematsu, Ferdinand Sibleyras, Yosuke Todo:
Cryptanalysis of Rocca and Feasibility of Its Security Claim. 123-151 - Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito

, Takanori Isobe:
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences. 152-190 - Thomas Johansson

, Willi Meier, Vu Nguyen
:
Attacks on the Firekite Cipher. 191-216 - Marcus Dansarie

, Patrick Derbez
, Gregor Leander
, Lukas Stennes:
Breaking HALFLOOP-24. 217-238 - Senyang Huang, Orna Agmon Ben-Yehuda, Orr Dunkelman, Alexander Maximov:

Finding Collisions against 4-Round SHA-3-384 in Practical Time. 239-270 - Hosein Hadipour

, Marcel Nageler
, Maria Eichlseder
:
Throwing Boomerangs into Feistel Structures Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE. 271-302 - Rusydi H. Makarim, Raghvendra Rohit:

Towards Tight Differential Bounds of Ascon A Hybrid Usage of SMT and MILP. 303-340 - Ting Li, Yao Sun:

SuperBall: A New Approach for MILP Modelings of Boolean Functions. 341-367 - Yosuke Todo, Takanori Isobe:

Hybrid Code Lifting on Space-Hard Block Ciphers Application to Yoroi and SPNbox. 368-402 - Shahram Rasoolzadeh

:
Low-Latency Boolean Functions and Bijective S-boxes. 403-447
Volume 2022, Number 4, 2022
- Fabio Banfi

:
SCB Mode: Semantically Secure Length-Preserving Encryption. 1-23 - Kazuki Nakaya, Tetsu Iwata:

Generalized Feistel Structures Based on Tweakable Block Ciphers. 24-91 - Subhadeep Banik

:
Cryptanalysis of Draco. 92-104 - Senpeng Wang, Dengguo Feng, Bin Hu, Jie Guan, Tairong Shi:

Practical Attacks on Full-round FRIET. 105-119 - Jules Baudrin, Anne Canteaut, Léo Perrin:

Practical Cube Attack against Nonce-Misused Ascon. 120-144 - Solane El Hirch, Silvia Mella, Alireza Mehrdad, Joan Daemen:

Improved Differential and Linear Trail Bounds for ASCON. 145-178 - Thomas Peyrin

, Quan Quan Tan:
Mind Your Path: On (Key) Dependencies in Differential Characteristics. 179-207 - Qianqian Yang, Ling Song, Siwei Sun, Danping Shi, Lei Hu:

New Properties of the Double Boomerang Connectivity Table. 208-242 - Christof Beierle, Patrick Felke, Gregor Leander

, Sondre Rønjom:
Decomposing Linear Layers. 243-265 - Ayineedi Venkateswarlu, Abhishek Kesarwani

, Sumanta Sarkar:
On the Lower Bound of Cost of MDS Matrices. 266-290 - Sayandeep Saha, Mustafa Khairallah

, Thomas Peyrin
:
Exploring Integrity of AEADs with Faults: Definitions and Constructions. 291-324

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














